0% found this document useful (0 votes)
86 views

Computer Applications-Class 9th

Uploaded by

shushilabhutra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views

Computer Applications-Class 9th

Uploaded by

shushilabhutra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Chapter-5th

Cloud computing-
Refers to storing and accessing data and programs over the Internet instead of your computer’s hard drive. Cloud
computing allows you to use resources like storage and software over the internet, making it easier to collaborate,
share, and access information from anywhere, anytime!

Broadly classified in two types:

1. Public Cloud- with this, all hardware, software and other supporting infrastructure is owned and managed
by the cloud provider and everything is commonly shared by all cloud tenants/the cloud subscribers.
2. Private Cloud- resources are used and exclusively owned by one business or organization. Infrastructure
is always maintained by private network and hardware/software are dedicated solely to one organization. It
is a.k.a. internal or enterprise cloud, resides on company’s intranet or hosted data center where all the data
is protected behind a firewall.

Multimedia-
Combination of many types of media in one application.

Components of multimedia-

a. Text
b. Graphics and Images
c. Audio
d. Video
e. Animation- a process of making a static image look like it is moving. It can be either 2D or 3D.

Social Networking-
The use of internet-based social media programs to make connections with friends, family, classmates, customers
and clients.

Social networking websites are providing a venue for people to share their activities with family, friends and
colleagues or to share their interest in a particular topic. (online community of Internet users with common interest,
hobbies, religion, politics etc.) a.k.a. social media.

Chat Sites- dedicated sites where registered users can login and chat with other logged in users, either publicly or
privately.
Chapter 6
Cyber Safety
Cyber safety refers to the safe and responsible use of internet so that to ensure safety and security of
personal information and not posing threat to anyone else’s information.

Identity protection while using Internet-


Identity fraud is when personal details that have been accessed or stolen are used to commit fraudulent
acts posing as someone else with stolen identity.

Solution for this can be- Private browsing, anonymous browsing etc

Ways to track a person online-

a. IP Address- It is a unique of device when you connect to internet. With this website can
determine your rough geographical location.
b. Cookies and Tracking Scripts- Cookies are small text files on your computer storing small
piece of information related to your online habits.
these are of two types basically-
1. First Party Cookies- stores your login id, password-and use them to autofill information etc.
2. Third Party Cookies- websites uses these to know about your search history and web
browsing history.
c. HTTP Referrer-when we clicks on a link then we are sharing our location with that web site.
d. Super Cookies- persistent cookies, those come back even after you delete them. It store data in
multiple places- like flash cookies, silverlight storage, browsing history etc.
e. User Agent- browser always sends a user agent every time you connect to a website.

Private Browsing and Anonymous Browsing-


Anonymous browsers allow users to view websites without revealing any personal information like their
IP address. Can be used as a tool for governments, journalists and everyday security conscious surfers.

Private Browsing where in browser opens in incognito mode and does not store cookies about your
online activity.

a. Incognito Browsing-opens up a version of the browser that will not track your activity.
b. Proxy- acts as a middleman between computer and website.
c. Virtual Private Network- It was originally meant for business employees working offsite to gain
access to shared drives on networks. Now a days it is used to add security and privacy to private
and public networks, like wifi hotspots and the internet.
Proper Usage of Passwords-
A strong password helps to-

a. Keep your personal information safe.


b. Protect your emails, files, and other content.
c. Prevent someone from breaking into your account.

Key features of good password-

1. No dictionary words, proper nouns and foreign words


2. No personal information
3. Use longer password
4. Use passphrases to remember complex password
5. Do not repeat password on different websites.

Ways in which password can be cracked

1. Someone’s out to get you to steal your details


2. You become the victim of a brute-force attack
3. There’s a data breach

Confidentiality of Information
It ensures that only authorized users get access to sensitive and protected data.

Practices to ensure confidentiality of information-

1. Use Firewall
2. Control Browser settings to block tracking
3. Browse Privately wherever possible
4. Be careful while posting on Internet
5. Ensure Safe sites while entering crucial information
6. Carefully handle emails
7. Do not give sensitive information on wireless networks
8. Avoid using public computers

Online Safety-
Any malicious programs on a computer or mobile device, such a virus, worm, Trojan horse, spyware
etc. are collectively called Malware.

These are unwanted software that someone else wants to run on your computer. Malware infects your
computer, making it behave in a way, which you do not approve it.
Types of Malware-

1. Computer Viruses- causes damage to data and files on a system.


2. Worms- It is a self replicating program which eats up the entire disk space or memory.
3. Trojan House- It appears harmless but actually performs malicious functions such as deleting or
damaging files.
4. Spyware- a software installed on your computer to spy on your activities and report this data to
people those are willing to pay for it.
5. Ransomware- It infects the computer and encrypts sensitive data and demands a ransom for their
release.
6. Adware- Programs which delivers unwanted ads on your computer.

Damage Caused by Malware-

1. Damage or delete files


2. Slow down your computer
3. Invade your email program
4. Compromises your data, computing habits and identity
5. Alters PC Settings
6. Adware tracks information just like spyware
7. Displays arrays of annoying advertising

Safety Measures-

Active Protection-

a. Use Anti Virus and Anti Spyware software


b. Download updates regularly
c. Run frequent full-system scans

Preventive Measures-

a. Keep your system up-to-date


b. Use caution when downloading files on the Internet.
c. Disable Cookies, if possible

Cyber Crime-
Any criminal offense that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as Cyber
Crime.
It covers Phishing, credit card fraud, illegal downloading, industrial espionage, child pornography, cyber
bullying, cyber stalking, cyber terrorism, creation and/or distribution of viruses and so on.

1. Cyber Bullying- Harassing, demeaning, embarrassing, defaming or intimidating someone using


modern technologies like internet, cell phones, instant messengers, social networks etc.
2. Cyber Stalking-Online harassment wherein the victim is subjected to a barrage of online
messages and emails. Typically these stalkers know their victims and instead of resorting to
offline stalking, they use the Internet to stalk.

Reporting a Cyber Crime

1. The local police stations can be approached for filing complaints just as the cybercrime cell
specially designated with jurisdiction to register complaint.
2. In addition, Provisions have now been made for filling of ‘E-FIR’ in most of the states.
3. The Ministry of Home Affairs is also launching a website for registering crimes against women
and children online including cybercrimes.

In Information Technology Act categorically provides that a cybercrime has global jurisdiction,
meaning that the crimes may be reported in the Cyber Crime Units of any City, irrespective of the
place where the act was committed.

You might also like