Computer Applications-Class 9th
Computer Applications-Class 9th
Cloud computing-
Refers to storing and accessing data and programs over the Internet instead of your computer’s hard drive. Cloud
computing allows you to use resources like storage and software over the internet, making it easier to collaborate,
share, and access information from anywhere, anytime!
1. Public Cloud- with this, all hardware, software and other supporting infrastructure is owned and managed
by the cloud provider and everything is commonly shared by all cloud tenants/the cloud subscribers.
2. Private Cloud- resources are used and exclusively owned by one business or organization. Infrastructure
is always maintained by private network and hardware/software are dedicated solely to one organization. It
is a.k.a. internal or enterprise cloud, resides on company’s intranet or hosted data center where all the data
is protected behind a firewall.
Multimedia-
Combination of many types of media in one application.
Components of multimedia-
a. Text
b. Graphics and Images
c. Audio
d. Video
e. Animation- a process of making a static image look like it is moving. It can be either 2D or 3D.
Social Networking-
The use of internet-based social media programs to make connections with friends, family, classmates, customers
and clients.
Social networking websites are providing a venue for people to share their activities with family, friends and
colleagues or to share their interest in a particular topic. (online community of Internet users with common interest,
hobbies, religion, politics etc.) a.k.a. social media.
Chat Sites- dedicated sites where registered users can login and chat with other logged in users, either publicly or
privately.
Chapter 6
Cyber Safety
Cyber safety refers to the safe and responsible use of internet so that to ensure safety and security of
personal information and not posing threat to anyone else’s information.
Solution for this can be- Private browsing, anonymous browsing etc
a. IP Address- It is a unique of device when you connect to internet. With this website can
determine your rough geographical location.
b. Cookies and Tracking Scripts- Cookies are small text files on your computer storing small
piece of information related to your online habits.
these are of two types basically-
1. First Party Cookies- stores your login id, password-and use them to autofill information etc.
2. Third Party Cookies- websites uses these to know about your search history and web
browsing history.
c. HTTP Referrer-when we clicks on a link then we are sharing our location with that web site.
d. Super Cookies- persistent cookies, those come back even after you delete them. It store data in
multiple places- like flash cookies, silverlight storage, browsing history etc.
e. User Agent- browser always sends a user agent every time you connect to a website.
Private Browsing where in browser opens in incognito mode and does not store cookies about your
online activity.
a. Incognito Browsing-opens up a version of the browser that will not track your activity.
b. Proxy- acts as a middleman between computer and website.
c. Virtual Private Network- It was originally meant for business employees working offsite to gain
access to shared drives on networks. Now a days it is used to add security and privacy to private
and public networks, like wifi hotspots and the internet.
Proper Usage of Passwords-
A strong password helps to-
Confidentiality of Information
It ensures that only authorized users get access to sensitive and protected data.
1. Use Firewall
2. Control Browser settings to block tracking
3. Browse Privately wherever possible
4. Be careful while posting on Internet
5. Ensure Safe sites while entering crucial information
6. Carefully handle emails
7. Do not give sensitive information on wireless networks
8. Avoid using public computers
Online Safety-
Any malicious programs on a computer or mobile device, such a virus, worm, Trojan horse, spyware
etc. are collectively called Malware.
These are unwanted software that someone else wants to run on your computer. Malware infects your
computer, making it behave in a way, which you do not approve it.
Types of Malware-
Safety Measures-
Active Protection-
Preventive Measures-
Cyber Crime-
Any criminal offense that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as Cyber
Crime.
It covers Phishing, credit card fraud, illegal downloading, industrial espionage, child pornography, cyber
bullying, cyber stalking, cyber terrorism, creation and/or distribution of viruses and so on.
1. The local police stations can be approached for filing complaints just as the cybercrime cell
specially designated with jurisdiction to register complaint.
2. In addition, Provisions have now been made for filling of ‘E-FIR’ in most of the states.
3. The Ministry of Home Affairs is also launching a website for registering crimes against women
and children online including cybercrimes.
In Information Technology Act categorically provides that a cybercrime has global jurisdiction,
meaning that the crimes may be reported in the Cyber Crime Units of any City, irrespective of the
place where the act was committed.