SlideShare a Scribd company logo
KENDRIYA VIDYALAYA
NO- 1 SAGAR (CANTT.)
SUBJECT- COMPUTER
POWER POINT PRESENTATION

SUBMITTED TO MR. V. NEMA
INTERNET
INTROUCTION TO INTERNET
The internet is a network consisting of
thousands of small and large compute
networks. In other words internet can be
defined as a global network where
million of computers are connected to
each other.
All computers connected on the
net can exchange information by
following certain rules called Protocols.
Therefore a protocol is a set of rules
which the computers use to
communicate with one another across a
network.
SERVICIES POVIDED BY INTERNET
1- World Wide Web (www)
2- E-Mail (Electronic mail)

3- News group
4- Chat
5- Bulleting Board Service
6- Video Conferencing
7- File Transfer Protocol (FTP)
8- E-Commerce
9- Telnet
10- Hyper Text Transfer Protocol (HTTP)
Components required to connect to
Internet

1- A Computer System
2- A Modem
3- An Internet Service Provider (ISP)
connection
4- An Internet browsing software.
Modem
A modem is a computer device to connect
to and communicate with other computes
via a telephone line. Modem convents
digital signals to analog symbols, which is
known as Modulation and also converts the
analog signals to digital signals, known as
Demodulation. Hence the word Modem
comes from Modulator and Demodulator.

THERE ARE TWO TYPE OF MODEMS
AVAILABLE :1- Internal Modem
2- External Modem.
INTERNET SERVICE PROVIDER (ISP)
Internet Service Provides are companies
that provide the Internet connection against
charging some fee. ISPs use powerful
computes called Savers with high storage
capacity and memory, which is connected
with other savers through satellites all over
the world. The ISPs gives an account
number an password to its user to gain
access to the Internet.
When we want to use the internet,
you dial an get connected to an ISP. The
ISP then handles al the communication
between us and the Internet.
ISP IN INIDA
SOME OF THE ISPS IN INIDA ARE:-

• VSNL
• MTML
• Manta On-Line
• Satyam On-Line
WEB BOWSER
It is a software, which allows the user to
access and browse information on the
internet. Without a web browser internet
cannot be accessed. Internet Explorer,
Netscape Navigator, Opera an Mosaic are
common examples of web browses.
WEBSITE
A website is a collection of web pages which
give information about an organization, a
topic etc. A website can contain many
Hypertext links which link to a piece of text
or graphic that is like to some other text,
graphic, page or file.
TYPES OF WEBSITES :1- .com for Commercial Purposes like
Rediffmail.com
2- .org for Organizations like Congress.org
3- .edu for Educational Purposes like
imt.edu
4- .gov for Government like
inianraiways.gov.in
UNIFORM RESOURCE LOCATOR (URL)

URL provides an address to locate any site
on the Internet. Every website has got a
distinct URL. With the help of the URL, the
web site is retrieved by the Web Browser.
The URL helps the user to identify and
locate any resource on the Internet.
Search engines
Search Engine is a software that helps us to
locate Web Pages on the Internet that
contain information on the specified topics.
We can search for any topic, images, news,
video, meaning etc. using the search
engines.
SOME POPULAR SEARCH ENGINES
ARE:1- http.//google.com
2- http//khoj.com
3- http//yahoo.com
4- http// indiatimes.com

5- http//altavista.com
6- http// lycos.com etc.
Computer virus
COMPUTER VIRUS
A computer virus is a program intentionally
designed by a programmer for destroying
system files and data of other computers. A
virus program duplicates itself without any
instruction from the user and damages the
data on our disk by corrupting programs, or
even formatting the entire hard disk. In other
words we can say that virus simply
replicates. Virus corrupts or damages the
data without the knowledge of the user at a
very great speed.
How does virus infect a computer
system
Computer virus spread with the great speed
from one computer to another by means of
infected disks, networks, programs
downloaded from the Internet etc. a floppy
disk can also infect a computer. Some virus
programs are so well designed that they
have a pre-set date or time on which they
automatically. Virus can infect the display of
a file or keyboard or any program files as
word processor, database etc.
HOW DOES VIRUS SPREAD
Virus can easily spread from one system to
another by copying any infected application
on starting the computer system. This is
because the virus goes into the memory of
the computer and starts infecting each
application that gets executed by us. The
virus programs get transferred into a
computer through other virus infected
programs, which we copy from floppies,
CDs etc. examples of such viruses are
Michealangelo, Monkey etc.
Different types of virus:Boot virus
This type of virus infects the startup area of
the hard disk o floppy disk. They attach
themselves with the boot area and overwrite
on the original instructions and take up
control of the system. Booting means
stating the computer and loading the
operating system.
EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
PROGRAM VIRUS
This type of virus infect application
programs such as word processor,
database etc. When the infected fie is
executed, the virus gets activated and
remains present in the main memory
even when the execution of the file is
over. When you execute another fie,
the virus attaches itself to the new fie
and thus another file gets infected.
EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle
etc.
SYSTEM VIRUS

These viruses attach themselves to the
operating system and infect the input/output
unit of the operating system. They always
stay in the memory, damage parts of the
operating system and then destroy
themselves.
TROJAN HORSES AND WORMS

Trojan horses programs are those programs
that are useful to perform certain tasks. But
at the same time they damage files or data
in the system. This program destroys
Effects of virus
1- Viruses generally affect the software, files and folders of a
computer. Hardware components are generally immune to
viruses.
2- Fie with .exe extensions are soft targets to viruses.

3- Viruses can infect boot records thereby causing booting
problems.
4- Other effects of viruses include corruption of data files,
periodic hang- ups, slow system performance, loss of data
etc.
5- Viruses can also alter the contents and the size of a file.
6- It can change the al the files names to a signal name.
7- It can erase programs or data.
8- It can overwrite entire directories.
9- It can create bad sectors in files and therefore destroy
parts of the files
PRECAUTIONS
WE SHOULD
1- Scan all floppies using antivirus software.

2- Write protect the floppies before coping
data from other computer system.
3- Keep backup of all data and files.
4- Prepare an emergency boot disk.

5- Update your Antivirus program
periodically.
6- Restrict the use of your computer system
so that there is no unauthorized use.
We should not

1- Use floppies without scanning them
for possible viruses.
2- Run an unknown program without
using an antivirus to detect any viruses.
3- Allow everyone to use your computer
system.

4- While using Internet do not download
anything from the Internet without
scanning for viruses.
ANTIVIRUS SOFTWaRE
Antivirus is a software designed to
detect and remove viruses from the
computer system. Some types of virus
are difficult to remove. Antivirus program
gets activated whenever the computer
system is booted up.
IT DETECTES THE VIRUS AND
REMOVES IT. ANTIVIRUS PROGRAM
ARE OF TWO TYPES:1- SCANNERS
2:-ANTIDOTES
SCANNERS
Scanners are programs that scan the
disks to detect viruses. These programs
scan the disk for any known virus. After
scanning the disk and detecting the
virus, they inform the user about the
infected files. The user can then delete
the infected file or get it cleaned by an
Antidote.
ANTIDOTE
Antidote are programmed to detect virus
and clean the infected disk. Cleaning
involves deleting the virus code from the
infected file e.g. an Antidote detects virus in
the boot area of a computer system. It will
then delete the virus code and rewrite the
programs back in their proper place.

SOME POPULAR ANTIVIRUS
SOFTWARES ARE:1- Norton Antivirus
2- Guardian

3- Smart Dog
4- McAfee

etc.
MADE BY – PRANJAL MISHRA
CLASS – 7TH A
ROLL NO. - 7037

More Related Content

What's hot

Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
Mirza Adnan Baig
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Software security
Software securitySoftware security
Software security
jes_d
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
Mitppt
MitpptMitppt
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
jyoti_lakhani
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
It ppt new
It ppt newIt ppt new
It ppt new
chrispaul8676
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
University of Sindh, Jamshoro
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
Virus09
Virus09Virus09
Virus09
defler
 

What's hot (20)

Malicious
MaliciousMalicious
Malicious
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Software security
Software securitySoftware security
Software security
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Mitppt
MitpptMitppt
Mitppt
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
computer security
computer securitycomputer security
computer security
 
Virus09
Virus09Virus09
Virus09
 

Viewers also liked

Parts of a computer (power point)
Parts of a computer (power point)Parts of a computer (power point)
Parts of a computer (power point)
Kanungnuch Chamnien
 
Power Point Presentation
Power Point PresentationPower Point Presentation
Power Point Presentation
S P Sajjan
 
Good and bad power point presentation
Good and bad power point presentationGood and bad power point presentation
Good and bad power point presentation
Bongiswa Bongie
 
Computer 6 (power point presentation) copy
Computer 6 (power point presentation)   copyComputer 6 (power point presentation)   copy
Computer 6 (power point presentation) copy
Jade Fernandez
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
Darshit narechania
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
Shahrukh Rahman
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Multimedia
MultimediaMultimedia
Multimedia
Shivam Tuteja
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 

Viewers also liked (15)

Parts of a computer (power point)
Parts of a computer (power point)Parts of a computer (power point)
Parts of a computer (power point)
 
Power Point Presentation
Power Point PresentationPower Point Presentation
Power Point Presentation
 
Good and bad power point presentation
Good and bad power point presentationGood and bad power point presentation
Good and bad power point presentation
 
Computer 6 (power point presentation) copy
Computer 6 (power point presentation)   copyComputer 6 (power point presentation)   copy
Computer 6 (power point presentation) copy
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networking
NetworkingNetworking
Networking
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Multimedia
MultimediaMultimedia
Multimedia
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Computer power point presentation

Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
Samiullah Khan
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Yousef Bahaa
 

Similar to Computer power point presentation (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computervirus
Computervirus Computervirus
Computervirus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
system Security
system Security system Security
system Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 

Recently uploaded (20)

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 

Computer power point presentation

  • 1. KENDRIYA VIDYALAYA NO- 1 SAGAR (CANTT.) SUBJECT- COMPUTER POWER POINT PRESENTATION SUBMITTED TO MR. V. NEMA
  • 3. INTROUCTION TO INTERNET The internet is a network consisting of thousands of small and large compute networks. In other words internet can be defined as a global network where million of computers are connected to each other. All computers connected on the net can exchange information by following certain rules called Protocols. Therefore a protocol is a set of rules which the computers use to communicate with one another across a network.
  • 4. SERVICIES POVIDED BY INTERNET 1- World Wide Web (www) 2- E-Mail (Electronic mail) 3- News group 4- Chat 5- Bulleting Board Service 6- Video Conferencing 7- File Transfer Protocol (FTP) 8- E-Commerce 9- Telnet 10- Hyper Text Transfer Protocol (HTTP)
  • 5. Components required to connect to Internet 1- A Computer System 2- A Modem 3- An Internet Service Provider (ISP) connection 4- An Internet browsing software.
  • 6. Modem A modem is a computer device to connect to and communicate with other computes via a telephone line. Modem convents digital signals to analog symbols, which is known as Modulation and also converts the analog signals to digital signals, known as Demodulation. Hence the word Modem comes from Modulator and Demodulator. THERE ARE TWO TYPE OF MODEMS AVAILABLE :1- Internal Modem 2- External Modem.
  • 7. INTERNET SERVICE PROVIDER (ISP) Internet Service Provides are companies that provide the Internet connection against charging some fee. ISPs use powerful computes called Savers with high storage capacity and memory, which is connected with other savers through satellites all over the world. The ISPs gives an account number an password to its user to gain access to the Internet. When we want to use the internet, you dial an get connected to an ISP. The ISP then handles al the communication between us and the Internet.
  • 8. ISP IN INIDA SOME OF THE ISPS IN INIDA ARE:- • VSNL • MTML • Manta On-Line • Satyam On-Line
  • 9. WEB BOWSER It is a software, which allows the user to access and browse information on the internet. Without a web browser internet cannot be accessed. Internet Explorer, Netscape Navigator, Opera an Mosaic are common examples of web browses.
  • 10. WEBSITE A website is a collection of web pages which give information about an organization, a topic etc. A website can contain many Hypertext links which link to a piece of text or graphic that is like to some other text, graphic, page or file. TYPES OF WEBSITES :1- .com for Commercial Purposes like Rediffmail.com 2- .org for Organizations like Congress.org 3- .edu for Educational Purposes like imt.edu 4- .gov for Government like inianraiways.gov.in
  • 11. UNIFORM RESOURCE LOCATOR (URL) URL provides an address to locate any site on the Internet. Every website has got a distinct URL. With the help of the URL, the web site is retrieved by the Web Browser. The URL helps the user to identify and locate any resource on the Internet.
  • 12. Search engines Search Engine is a software that helps us to locate Web Pages on the Internet that contain information on the specified topics. We can search for any topic, images, news, video, meaning etc. using the search engines. SOME POPULAR SEARCH ENGINES ARE:1- http.//google.com 2- http//khoj.com 3- http//yahoo.com 4- http// indiatimes.com 5- http//altavista.com 6- http// lycos.com etc.
  • 14. COMPUTER VIRUS A computer virus is a program intentionally designed by a programmer for destroying system files and data of other computers. A virus program duplicates itself without any instruction from the user and damages the data on our disk by corrupting programs, or even formatting the entire hard disk. In other words we can say that virus simply replicates. Virus corrupts or damages the data without the knowledge of the user at a very great speed.
  • 15. How does virus infect a computer system Computer virus spread with the great speed from one computer to another by means of infected disks, networks, programs downloaded from the Internet etc. a floppy disk can also infect a computer. Some virus programs are so well designed that they have a pre-set date or time on which they automatically. Virus can infect the display of a file or keyboard or any program files as word processor, database etc.
  • 16. HOW DOES VIRUS SPREAD Virus can easily spread from one system to another by copying any infected application on starting the computer system. This is because the virus goes into the memory of the computer and starts infecting each application that gets executed by us. The virus programs get transferred into a computer through other virus infected programs, which we copy from floppies, CDs etc. examples of such viruses are Michealangelo, Monkey etc.
  • 17. Different types of virus:Boot virus This type of virus infects the startup area of the hard disk o floppy disk. They attach themselves with the boot area and overwrite on the original instructions and take up control of the system. Booting means stating the computer and loading the operating system. EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
  • 18. PROGRAM VIRUS This type of virus infect application programs such as word processor, database etc. When the infected fie is executed, the virus gets activated and remains present in the main memory even when the execution of the file is over. When you execute another fie, the virus attaches itself to the new fie and thus another file gets infected. EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle etc.
  • 19. SYSTEM VIRUS These viruses attach themselves to the operating system and infect the input/output unit of the operating system. They always stay in the memory, damage parts of the operating system and then destroy themselves.
  • 20. TROJAN HORSES AND WORMS Trojan horses programs are those programs that are useful to perform certain tasks. But at the same time they damage files or data in the system. This program destroys
  • 21. Effects of virus 1- Viruses generally affect the software, files and folders of a computer. Hardware components are generally immune to viruses. 2- Fie with .exe extensions are soft targets to viruses. 3- Viruses can infect boot records thereby causing booting problems. 4- Other effects of viruses include corruption of data files, periodic hang- ups, slow system performance, loss of data etc. 5- Viruses can also alter the contents and the size of a file. 6- It can change the al the files names to a signal name. 7- It can erase programs or data. 8- It can overwrite entire directories. 9- It can create bad sectors in files and therefore destroy parts of the files
  • 22. PRECAUTIONS WE SHOULD 1- Scan all floppies using antivirus software. 2- Write protect the floppies before coping data from other computer system. 3- Keep backup of all data and files. 4- Prepare an emergency boot disk. 5- Update your Antivirus program periodically. 6- Restrict the use of your computer system so that there is no unauthorized use.
  • 23. We should not 1- Use floppies without scanning them for possible viruses. 2- Run an unknown program without using an antivirus to detect any viruses. 3- Allow everyone to use your computer system. 4- While using Internet do not download anything from the Internet without scanning for viruses.
  • 24. ANTIVIRUS SOFTWaRE Antivirus is a software designed to detect and remove viruses from the computer system. Some types of virus are difficult to remove. Antivirus program gets activated whenever the computer system is booted up. IT DETECTES THE VIRUS AND REMOVES IT. ANTIVIRUS PROGRAM ARE OF TWO TYPES:1- SCANNERS 2:-ANTIDOTES
  • 25. SCANNERS Scanners are programs that scan the disks to detect viruses. These programs scan the disk for any known virus. After scanning the disk and detecting the virus, they inform the user about the infected files. The user can then delete the infected file or get it cleaned by an Antidote.
  • 26. ANTIDOTE Antidote are programmed to detect virus and clean the infected disk. Cleaning involves deleting the virus code from the infected file e.g. an Antidote detects virus in the boot area of a computer system. It will then delete the virus code and rewrite the programs back in their proper place. SOME POPULAR ANTIVIRUS SOFTWARES ARE:1- Norton Antivirus 2- Guardian 3- Smart Dog 4- McAfee etc.
  • 27. MADE BY – PRANJAL MISHRA CLASS – 7TH A ROLL NO. - 7037