SlideShare a Scribd company logo
1
Computer Virus
Computer viruses are small software programs that are designed to spread from
one computer to another and to interfere with computer operation. A virus might
corrupt or delete data on your computer, use your e-mail program to spread itself
to other computers, or even erase everything on your hard disk. Viruses often
perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, increasing
maintenance cost etc. Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. Viruses also spread through downloads
on the Internet. They can be hidden in illicit software or other files or programs you
might download.
Malware
Malware (for “malicious software”) is any program or file that is harmful to a
computer user. Malware is a term for any software that gets installed on your
machine and performs unwanted tasks, often for some third party’s benefit.
Malware programs can range from being simple pop-up advertising to causing
serious computer invasion and the damage (eg. Stealing passwords and data or
infecting other machines on the network). Some malware provides no uninstall
option, and installs code in unexpected and hidden places (eg. Windows registry) or
modifies the operating system, thus making it more difficult to remove.
Spyware
A program written to monitor your action on a computer. A common type of
spyware is a key-logger program. This program can record every key stroke and
mouse click you make. Spyware can be delivered via a Trojan horse program.
Trojan horse
A program written to deliver a malicious program that may then cause
destruction to your computer. A Trojan horse is delivered by someone or hidden
within another program that may seem harmless.
2
Adware
Adware is any software application in which advertising banners are displayed
while a program is running. The ads are delivered through pop-up windows or bars
that appear on the program's user interface. Adware is commonly created for
computers, but may also be found on mobile devices.
Preventive measures- (Firewall, antivirus software)
How to prevent computer viruses
 Install a reliable antivirus program
 Avoid suspicious websites
 Never Open Email attachments without scanning them first.
 Setup automatic scans
 Stay away from cracked software
 Install a firewall
Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewall can be implemented in both software and hardware.
Firewalls are frequently used to prevent unauthorized internet users from accessing
private networks connected to the Internet. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria. Firewall is a network security system
that monitors and controls the incoming and outgoing network traffic based on
predetermined security rules.
Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc.
Antivirus Software
Antivirus software is a program or set of programs that are designed to
prevent, search for, detect and remove software viruses and other malicious
3
software like worms, Trojans, adware and more. These tools are critical for users to
have installed and up-to-date because a computer without antivirus software
installed will be infected within minutes of connecting to the internet. There are
several different companies that build and offer antivirus software and what each
offers can vary but all perform some basic functions:
1. Scan specific files or directories for any malware or known malicious patterns
2. Allow you to schedule scans to automatically run for you
3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or
flash drive at any time.
4. Remove any malicious code detected
Cyber privacy and password protection
Cyber Privacy
Privacy is our right to control what happens with personal information about
us.
Internet privacy violation risks may be minimized as follows:
• Always use preventative s/w applications such as Anti-virus anti-malware.
• Avoid shopping on unreliable websites
• Avoid exposing personal data on websites with lower security levels
• Clear the browser’s cache and browsing history on a consistent basis
• Always use very strong passwords consisting of letters numerals and special
characters.
Passwordprotection
• Never give out your password to any one
• Don’t just use one password
• Create password that easy to remember but hard to others guess.
• Make the password at least 8 characters long
4
• Include numbers capital letters and symbols
• Don’t fall the phishing attack
Legal and ethical issues
Copyright
The exclusive right given by law for a certain term of years to an author,
composer etc. to print, publish and sell copies of his original work. Copyright allows
authors, musicians, artists etc. to make money of their labor. It also prevents people
from altering the work without permission. Copyright law can be protected, literary
work, musical work, Dramatic work, Choreographic work, pictorial, graphic,
sculptural works, motion pictures, AV, Sound recording, architectural works. It give
the copyright holders to reproduce the work, right to prepare derivative works,
right to distribute copies for sale, right to prepare AV work publicly, right to display
musical and artistic works publicly.
Creative Common License
A Creative Commons (CC) license is one of several public copy right
licenses that enable the free distribution of an otherwise copyrighted "work". A CC
license is used when an author wants to give other people the right to share, use,
and build upon a work that they (the author) have created.
Plagiarism
Plagiarism is the "wrongful appropriation" and "stealing and publication" of
another author's "language, thoughts, ideas, or expressions" and the representation
of them as one's own original work. Plagiarism is the act of taking another person’s
writing, conversation, song or even idea and passing it off as your own. This includes
information from web pages, books, songs, television shows, email messages,
interviews, articles, artworks or any other medium. Whenever you paraphrase,
summarize, words, phrases or sentence from another person’s work, it is necessary
to indicate the source of the information within your paper using an internal
citation.
5
Hacking
The process of attempting to gain or successfully gaining unauthorized access
to computer resources for the purpose of help or secure system is called hacking.
Hacking is the technique in which any one can access and one’s computer without
his permission. A hacker knows all about the operating system and different holes in
the system. Computer hacking is when files on your computer are view created or
edited without your authorization. Hacker can gain complete access to your
computer from any were in the world if your computer is turned on, unprotected
and has an internet connection.
1. White-Hat Hackers
The good guys who identify the security weakness of the system or network
and inform the owner about them. A white hat hacker’s breaks security for no-
malicious reasons, perhaps to test their own security system or while working in
a security company which makes security software. White-hat hacker is also
referred to as the ethical hacker.
2. Black Hat Hackers
A black hat hacker is the villain or bad guy, who crash into victim’s security to
steal information and destroy the victim’s security network. Black hat hacker is
also known as cracker. Black hat hacker break into secure networks to destroy
data.
3. Grey Hat Hackers
Grey hat hacker is the combination of black hat hacker and white hat hacker. A
grey hat hacker may surf the internet and hack into a computer system for the
sole purpose of notifying the administrator that their system has a security
defect. Then they may offer correct the defect for a fee.
6
Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of
polite behavior in society, netiquette is a code of good behavior on the Internet.
This includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of
online communication. There are ten rules of netiquette that everyone who goes
online should follow
• Remember the Human
• Adhere to the same standards online that you follow in real life
• Know where you are in cyberspace
• Respect other people’s time
• Make yourself look good online
• Share expert knowledge
• Help keep flame wars under control
• Respect other people’s privacy
• Don’t abuse your power
• Be forgiving of other people’s mistakes
Phishing
Phishing is a fraudulent attempt, usually made through email, to steal your
personal information. Phishing emails usually appear to come from a well- known
organization and ask for your personal information- such as credit card number,
social security number, account number or password.
Prevent phishing attacks
 Do not reply to emails that request financial information, even if ti appears to
be from a trusted source
 Do not reply to emails from unrecognized senders.
7
 Do not open any links in suspicious emails, instant messages, or chat-room
messages.
 Only communicate personal information over the phone or through a secure
website.
 Never use email to share personal information.
 Avoid using email on public computers.
 Don’t click anything in pop-up windows.
 Use security programs to protect your computer.
 Check your credit report and financial statements regularly
Software piracy
Unauthorized copying or distribution of copyrighted software. It is done by
copying, downloading, sharing, selling or installing multiple copies onto personal or
work computers. A term used to describe the act of illegally using, copying or
distributing software without ownership or legal rights. The majority of software
today is purchased as an one-site license, meaning that only one computer may
have that software installed on it at one time. Copying that software to multiple
computers or sharing it with your friend without multiple Licenses is considered
software piracy, which is illegal. Under the Indian Copyright Act, a software pirate
can be tried under both civil and criminal law. The minimum jail term for software
copyright infringement is seven days and the maximum jail term is three years.
Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees.
Software privacy
Privacy software is software built to protect the privacy of its users. The
software typically works in conjunction with Internet usage to control or limit the
amount of information made available to third parties. The software can
apply encryption or filtering of various kinds. Privacy software can refer to two
different types of protection. One type is protecting a user's Internet privacy from
the World Wide Web. There are software products that will mask or hide a user's IP
address from the outside world in order to protect the user from identity theft. The
second type of protection is hiding or deleting the users Internet traces that are left
8
on their PC after they have been surfing the Internet. There is software that will
erase all the users Internet traces and there is software that will hide and encrypt a
user's traces so that others using their PC will not know where they have been
surfing.
Cyber law- IT Act 2000,IT Act 2008
Cyber law is the law for regulating controlling and governing cyber space.
Cyber space includes computers network, software, data storage devices, Internet,
websites email and other electronic devices such as mobile phone ATM machines
etc. The Information technology Act 2000 passed by Indian parliament on 17
October 2000.The original act contained in 94 sections, divided in 13 chapters and 4
schedules.
Section Offence Penalty
65 Tampering with computer
source documents
Imprisonment up to three years or/and with
fine up to Rs.200000
66 Hacking with computer
system
Imprisonment up to three years or/and with
fine up to Rs.500000
66A Sending offensive messages **24th
march 2015 SC cancelled this section
66B Receiving stolen computer or
communication device
Imprisonment up to three years or/and with
fine up to Rs.100000
66C Using password of another
person
Imprisonment up to three years or/and with
fine up to Rs.100000
66D Cheating using computer
resource
Imprisonment up to three years or/and with
fine up to Rs.100000
66E Publishing private images of
others
Imprisonment up to three years or/and with
fine up to Rs.200000
66F Acts of cyber terrorism Imprisonment up to life.
67 Publishing information which
is obscene in electronic form
Imprisonment up to five years or/and with
fine up to Rs.1000000
9
67A Publishing images containing
sexual acts
Imprisonment up to seven years or/and
with fine up to Rs.1000000
67B Publishing Child porn or
predating children online
Imprisonment up to five years or/and with
fine up to Rs.1000000 on first conviction.
Imprisonment up to seven years or/and
with fine up to Rs.1000000 on second
conviction.
67C Failure to maintain records Imprisonment up to three years or/and with
fine
68 Failure/refusal to comply
with orders
Imprisonment up to three years or/and with
fine up to Rs.200000
69 Failure/refusal to decrypt
data
Imprisonment up to seven years and
possible fine
70 Securing access or
attempting to secure access
to a protected system
Imprisonment up to tenyears or/and with
fine
71 Misrepresentation Imprisonment up to three years or/and with
fine up to Rs.100000
IT Act 2008
The information technology Amendment Act, 2008(IT Act 2008) is a
substantial addition to India’s Information Technology Act 2000. In the 2008 version
of the act there are 124 sections and 14 chapters. The IT Amendment Act was
passed by the Indian parliament in October 2008 and came into force a year later.
The Act is administered by the Indian Computer Emergency Response Team (CERT-
In). The original Act was developed to promote the IT industry, regulate e-
commerce, facilitate e-governance and prevent cybercrimes. The Amendment has
been criticized for decreasing the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of individuals.
10
Morphing
Short for metamorphosing, morphing refers to an animation technique in
which one image is gradually turned into another. Many advanced animation
programs support some type of morphing feature. Morphing is editing the original
picture by unauthorized user or fake identity. It was identified that female’s pictures
are downloaded by fake users and again re-posted/uploaded on different websites
by creating fake profiles after editing it.
Pornography
Porn is the abbreviation for pornography, which is sexual material that is
explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit
material can be presented in a variety of ways, including magazines, photographs,
Films, writings, sculptures, animation, sound recordings and video games. The
effects of pornography have a tremendous amount of negative outcomes. Some
research has shown that viewing/using pornography has an influence on domestic
violence, sexual dysfunction, rape, difficulties with a sexual relationship and child
sexual abuse.
Health hazards of using computer
 Repetitive Strain Injury(RSI) in Wrists and Hands
Typing and using a mouse for long periods are common causes of RSI in
the wrist (it is often called carpal-tunnel syndrome)
1. Use a wrist-rest to support the wrists while typing and when using the
mouse
2. Take regular break from typing or using the mouse
 Back and Neck Ache
People suffer from back and neck pain after working at a computer for a
long time. This is usually due to them having a bad sitting posture.
1. Use an adjustable, ergonomic chair and take the time to set it up
properly.
11
2. The computer keyboard and monitor should be at the correct height for
the seated person (keyboard lower than the elbow, top of monitor at eye
level)
3. Take regular breaks: get up, walk around, stretch your muscles
 Eye-Strain
This is caused by looking at a monitor which is a constant distance away.
The muscles that focus your eyes do not move, so get tired and painful. Eye-
strain can also causes headaches.
1. Look away from the monitor at regular Intervals refocus on distant or
close objects to exercise the muscles in the eye.
2. Use an anti-glare filter in front of the monitor to cut down on screen
reflections that can also tire the eyes.

More Related Content

What's hot

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Hacking
HackingHacking
Hacking
sajeena81
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Leelet1121
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
System failure
System  failureSystem  failure
System failure
chrispaul8676
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Hacking
HackingHacking
Hacking
pranav patade
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Malwares
MalwaresMalwares
Malwares
Abolfazl Naderi
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
nayakslideshare
 

What's hot (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Hacking
HackingHacking
Hacking
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Internet security
Internet securityInternet security
Internet security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
System failure
System  failureSystem  failure
System failure
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Hacking
HackingHacking
Hacking
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
Hacking Hacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Malwares
MalwaresMalwares
Malwares
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 

Similar to Computer virus

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal6
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 

Similar to Computer virus (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Computer security
Computer securityComputer security
Computer security
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

More from vazhichal12

Online assignment
Online assignmentOnline assignment
Online assignment
vazhichal12
 
Assignment
AssignmentAssignment
Assignment
vazhichal12
 
Copyright
CopyrightCopyright
Copyright
vazhichal12
 
Copyright
CopyrightCopyright
Copyright
vazhichal12
 
Online assignment exploratory
Online assignment exploratoryOnline assignment exploratory
Online assignment exploratory
vazhichal12
 
Curriculum vitae
Curriculum vitae Curriculum vitae
Curriculum vitae
vazhichal12
 
Pedagogy assignment
Pedagogy assignmentPedagogy assignment
Pedagogy assignment
vazhichal12
 
Online assignment Exploratory Learning
Online assignment Exploratory LearningOnline assignment Exploratory Learning
Online assignment Exploratory Learning
vazhichal12
 
Keerthana methodology assignment 2
Keerthana methodology assignment 2Keerthana methodology assignment 2
Keerthana methodology assignment 2
vazhichal12
 
Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2
vazhichal12
 
Blessy methodology assignment 2
Blessy methodology assignment 2Blessy methodology assignment 2
Blessy methodology assignment 2
vazhichal12
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
vazhichal12
 
Second sem optional assignment 1
Second sem optional assignment 1Second sem optional assignment 1
Second sem optional assignment 1
vazhichal12
 
Online 2
Online 2Online 2
Online 2
vazhichal12
 
Learning management system
Learning management systemLearning management system
Learning management system
vazhichal12
 
Hsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-convertedHsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-converted
vazhichal12
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
vazhichal12
 
ONLINE ASSIGNMENT
ONLINE ASSIGNMENTONLINE ASSIGNMENT
ONLINE ASSIGNMENT
vazhichal12
 
POWER POINT PRESENTATION
POWER POINT PRESENTATION POWER POINT PRESENTATION
POWER POINT PRESENTATION
vazhichal12
 
Itinerant Retailers
Itinerant RetailersItinerant Retailers
Itinerant Retailers
vazhichal12
 

More from vazhichal12 (20)

Online assignment
Online assignmentOnline assignment
Online assignment
 
Assignment
AssignmentAssignment
Assignment
 
Copyright
CopyrightCopyright
Copyright
 
Copyright
CopyrightCopyright
Copyright
 
Online assignment exploratory
Online assignment exploratoryOnline assignment exploratory
Online assignment exploratory
 
Curriculum vitae
Curriculum vitae Curriculum vitae
Curriculum vitae
 
Pedagogy assignment
Pedagogy assignmentPedagogy assignment
Pedagogy assignment
 
Online assignment Exploratory Learning
Online assignment Exploratory LearningOnline assignment Exploratory Learning
Online assignment Exploratory Learning
 
Keerthana methodology assignment 2
Keerthana methodology assignment 2Keerthana methodology assignment 2
Keerthana methodology assignment 2
 
Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2
 
Blessy methodology assignment 2
Blessy methodology assignment 2Blessy methodology assignment 2
Blessy methodology assignment 2
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
 
Second sem optional assignment 1
Second sem optional assignment 1Second sem optional assignment 1
Second sem optional assignment 1
 
Online 2
Online 2Online 2
Online 2
 
Learning management system
Learning management systemLearning management system
Learning management system
 
Hsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-convertedHsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-converted
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
 
ONLINE ASSIGNMENT
ONLINE ASSIGNMENTONLINE ASSIGNMENT
ONLINE ASSIGNMENT
 
POWER POINT PRESENTATION
POWER POINT PRESENTATION POWER POINT PRESENTATION
POWER POINT PRESENTATION
 
Itinerant Retailers
Itinerant RetailersItinerant Retailers
Itinerant Retailers
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 

Computer virus

  • 1. 1 Computer Virus Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, increasing maintenance cost etc. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Malware Malware (for “malicious software”) is any program or file that is harmful to a computer user. Malware is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party’s benefit. Malware programs can range from being simple pop-up advertising to causing serious computer invasion and the damage (eg. Stealing passwords and data or infecting other machines on the network). Some malware provides no uninstall option, and installs code in unexpected and hidden places (eg. Windows registry) or modifies the operating system, thus making it more difficult to remove. Spyware A program written to monitor your action on a computer. A common type of spyware is a key-logger program. This program can record every key stroke and mouse click you make. Spyware can be delivered via a Trojan horse program. Trojan horse A program written to deliver a malicious program that may then cause destruction to your computer. A Trojan horse is delivered by someone or hidden within another program that may seem harmless.
  • 2. 2 Adware Adware is any software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly created for computers, but may also be found on mobile devices. Preventive measures- (Firewall, antivirus software) How to prevent computer viruses  Install a reliable antivirus program  Avoid suspicious websites  Never Open Email attachments without scanning them first.  Setup automatic scans  Stay away from cracked software  Install a firewall Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewall can be implemented in both software and hardware. Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc. Antivirus Software Antivirus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious
  • 3. 3 software like worms, Trojans, adware and more. These tools are critical for users to have installed and up-to-date because a computer without antivirus software installed will be infected within minutes of connecting to the internet. There are several different companies that build and offer antivirus software and what each offers can vary but all perform some basic functions: 1. Scan specific files or directories for any malware or known malicious patterns 2. Allow you to schedule scans to automatically run for you 3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time. 4. Remove any malicious code detected Cyber privacy and password protection Cyber Privacy Privacy is our right to control what happens with personal information about us. Internet privacy violation risks may be minimized as follows: • Always use preventative s/w applications such as Anti-virus anti-malware. • Avoid shopping on unreliable websites • Avoid exposing personal data on websites with lower security levels • Clear the browser’s cache and browsing history on a consistent basis • Always use very strong passwords consisting of letters numerals and special characters. Passwordprotection • Never give out your password to any one • Don’t just use one password • Create password that easy to remember but hard to others guess. • Make the password at least 8 characters long
  • 4. 4 • Include numbers capital letters and symbols • Don’t fall the phishing attack Legal and ethical issues Copyright The exclusive right given by law for a certain term of years to an author, composer etc. to print, publish and sell copies of his original work. Copyright allows authors, musicians, artists etc. to make money of their labor. It also prevents people from altering the work without permission. Copyright law can be protected, literary work, musical work, Dramatic work, Choreographic work, pictorial, graphic, sculptural works, motion pictures, AV, Sound recording, architectural works. It give the copyright holders to reproduce the work, right to prepare derivative works, right to distribute copies for sale, right to prepare AV work publicly, right to display musical and artistic works publicly. Creative Common License A Creative Commons (CC) license is one of several public copy right licenses that enable the free distribution of an otherwise copyrighted "work". A CC license is used when an author wants to give other people the right to share, use, and build upon a work that they (the author) have created. Plagiarism Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work. Plagiarism is the act of taking another person’s writing, conversation, song or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, words, phrases or sentence from another person’s work, it is necessary to indicate the source of the information within your paper using an internal citation.
  • 5. 5 Hacking The process of attempting to gain or successfully gaining unauthorized access to computer resources for the purpose of help or secure system is called hacking. Hacking is the technique in which any one can access and one’s computer without his permission. A hacker knows all about the operating system and different holes in the system. Computer hacking is when files on your computer are view created or edited without your authorization. Hacker can gain complete access to your computer from any were in the world if your computer is turned on, unprotected and has an internet connection. 1. White-Hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them. A white hat hacker’s breaks security for no- malicious reasons, perhaps to test their own security system or while working in a security company which makes security software. White-hat hacker is also referred to as the ethical hacker. 2. Black Hat Hackers A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victim’s security network. Black hat hacker is also known as cracker. Black hat hacker break into secure networks to destroy data. 3. Grey Hat Hackers Grey hat hacker is the combination of black hat hacker and white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect. Then they may offer correct the defect for a fee.
  • 6. 6 Netiquette Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such as email, social media, online chat, web forums, website comments, multiplayer gaming, and other types of online communication. There are ten rules of netiquette that everyone who goes online should follow • Remember the Human • Adhere to the same standards online that you follow in real life • Know where you are in cyberspace • Respect other people’s time • Make yourself look good online • Share expert knowledge • Help keep flame wars under control • Respect other people’s privacy • Don’t abuse your power • Be forgiving of other people’s mistakes Phishing Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well- known organization and ask for your personal information- such as credit card number, social security number, account number or password. Prevent phishing attacks  Do not reply to emails that request financial information, even if ti appears to be from a trusted source  Do not reply to emails from unrecognized senders.
  • 7. 7  Do not open any links in suspicious emails, instant messages, or chat-room messages.  Only communicate personal information over the phone or through a secure website.  Never use email to share personal information.  Avoid using email on public computers.  Don’t click anything in pop-up windows.  Use security programs to protect your computer.  Check your credit report and financial statements regularly Software piracy Unauthorized copying or distribution of copyrighted software. It is done by copying, downloading, sharing, selling or installing multiple copies onto personal or work computers. A term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. The majority of software today is purchased as an one-site license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple Licenses is considered software piracy, which is illegal. Under the Indian Copyright Act, a software pirate can be tried under both civil and criminal law. The minimum jail term for software copyright infringement is seven days and the maximum jail term is three years. Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees. Software privacy Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. The software can apply encryption or filtering of various kinds. Privacy software can refer to two different types of protection. One type is protecting a user's Internet privacy from the World Wide Web. There are software products that will mask or hide a user's IP address from the outside world in order to protect the user from identity theft. The second type of protection is hiding or deleting the users Internet traces that are left
  • 8. 8 on their PC after they have been surfing the Internet. There is software that will erase all the users Internet traces and there is software that will hide and encrypt a user's traces so that others using their PC will not know where they have been surfing. Cyber law- IT Act 2000,IT Act 2008 Cyber law is the law for regulating controlling and governing cyber space. Cyber space includes computers network, software, data storage devices, Internet, websites email and other electronic devices such as mobile phone ATM machines etc. The Information technology Act 2000 passed by Indian parliament on 17 October 2000.The original act contained in 94 sections, divided in 13 chapters and 4 schedules. Section Offence Penalty 65 Tampering with computer source documents Imprisonment up to three years or/and with fine up to Rs.200000 66 Hacking with computer system Imprisonment up to three years or/and with fine up to Rs.500000 66A Sending offensive messages **24th march 2015 SC cancelled this section 66B Receiving stolen computer or communication device Imprisonment up to three years or/and with fine up to Rs.100000 66C Using password of another person Imprisonment up to three years or/and with fine up to Rs.100000 66D Cheating using computer resource Imprisonment up to three years or/and with fine up to Rs.100000 66E Publishing private images of others Imprisonment up to three years or/and with fine up to Rs.200000 66F Acts of cyber terrorism Imprisonment up to life. 67 Publishing information which is obscene in electronic form Imprisonment up to five years or/and with fine up to Rs.1000000
  • 9. 9 67A Publishing images containing sexual acts Imprisonment up to seven years or/and with fine up to Rs.1000000 67B Publishing Child porn or predating children online Imprisonment up to five years or/and with fine up to Rs.1000000 on first conviction. Imprisonment up to seven years or/and with fine up to Rs.1000000 on second conviction. 67C Failure to maintain records Imprisonment up to three years or/and with fine 68 Failure/refusal to comply with orders Imprisonment up to three years or/and with fine up to Rs.200000 69 Failure/refusal to decrypt data Imprisonment up to seven years and possible fine 70 Securing access or attempting to secure access to a protected system Imprisonment up to tenyears or/and with fine 71 Misrepresentation Imprisonment up to three years or/and with fine up to Rs.100000 IT Act 2008 The information technology Amendment Act, 2008(IT Act 2008) is a substantial addition to India’s Information Technology Act 2000. In the 2008 version of the act there are 124 sections and 14 chapters. The IT Amendment Act was passed by the Indian parliament in October 2008 and came into force a year later. The Act is administered by the Indian Computer Emergency Response Team (CERT- In). The original Act was developed to promote the IT industry, regulate e- commerce, facilitate e-governance and prevent cybercrimes. The Amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking sufficient safeguards to protect the civil rights of individuals.
  • 10. 10 Morphing Short for metamorphosing, morphing refers to an animation technique in which one image is gradually turned into another. Many advanced animation programs support some type of morphing feature. Morphing is editing the original picture by unauthorized user or fake identity. It was identified that female’s pictures are downloaded by fake users and again re-posted/uploaded on different websites by creating fake profiles after editing it. Pornography Porn is the abbreviation for pornography, which is sexual material that is explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit material can be presented in a variety of ways, including magazines, photographs, Films, writings, sculptures, animation, sound recordings and video games. The effects of pornography have a tremendous amount of negative outcomes. Some research has shown that viewing/using pornography has an influence on domestic violence, sexual dysfunction, rape, difficulties with a sexual relationship and child sexual abuse. Health hazards of using computer  Repetitive Strain Injury(RSI) in Wrists and Hands Typing and using a mouse for long periods are common causes of RSI in the wrist (it is often called carpal-tunnel syndrome) 1. Use a wrist-rest to support the wrists while typing and when using the mouse 2. Take regular break from typing or using the mouse  Back and Neck Ache People suffer from back and neck pain after working at a computer for a long time. This is usually due to them having a bad sitting posture. 1. Use an adjustable, ergonomic chair and take the time to set it up properly.
  • 11. 11 2. The computer keyboard and monitor should be at the correct height for the seated person (keyboard lower than the elbow, top of monitor at eye level) 3. Take regular breaks: get up, walk around, stretch your muscles  Eye-Strain This is caused by looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move, so get tired and painful. Eye- strain can also causes headaches. 1. Look away from the monitor at regular Intervals refocus on distant or close objects to exercise the muscles in the eye. 2. Use an anti-glare filter in front of the monitor to cut down on screen reflections that can also tire the eyes.