Saturday, November 20, 2021

What is Software

 

Software

Software, simply are the computer programs. The instructions given to the computer in the form of a program are called Software. Software is the set of programs, which are used for different purposes. All the programs used in computer to perform specific task is called Software.

Software is a collection of programmes, documentation and procedures.

Software = Programmes + Documentation + Procedures

Programmes :

Set of instructions

Documentation:

“What is”, Documentation describes information about software such as software names, software requirement, features and functions of software etc.

Procedures:

“How to”, Procedures describe the working procedure of software i.e. how to operate software.

 




Types of software

1. System software:

System software is computer software designed to operate the computer hardware and to provide and maintain a platform for running application software.

a) Operating System Software

An operating system (OS) is software, consisting of programs and data that runs on computers and manages the computer hardware and provides common services for efficient execution of various application software.

Example :- DOS, Windows XP, Windows Vista, Windows 7/8/8.1/10, Unix/Linux, MAC/OS X etc.

b) Utility Software

Utility software is system software designed to help analyze, configure, optimize or maintain a computer. A single piece of utility software is usually called a utility or tool. Utility software usually focuses on how the computer infrastructure operates.

Examples areWindows Explorer (File/Folder Management), Windows Media Player, Anti-Virus Utilities, Disk Defragmentation, Disk Clean, BackUp, WinZip, WinRAR etc…

 

2. Application software:

Application software, also known as an application, is computer software designed to help the user to perform singular or multiple related specific tasks. Examples include enterprise software, accounting software, office suites, graphics software, and media players.

a) Package Software Multiple software programs that work together (or performs similar functions) and is bundled and sold together as a software package. Examples are :- Ms. Office 2003, Ms. Office 2007, Macromedia (Dreamweaver, Flash, Freehand), Adobe (PageMaker, PhotoShop)

b) Tailored or Custom Software Custom software (also known as bespoke software) is a type of software that is developed either for a specific organization or function that differs from or is opposite of other already available softwareSAGE (Accounting), Galileo/Worldspan (Travel) etc.

What is Computer

 


Computer:

Computer an electronic machine that can accept different type of input and produce different type of output according to the user instructions and saves output for the future use.  Computer can store, find and arrange information, calculate amounts and control other machines.

It can process both numerical and non-numerical (arithmetic and logical) calculations.

A computer has four functions:

A.      accepts data                                               Input

B.      processes data                                          Processing

C.      produces output                                      Output

D.      stores results                                             Storage

 



Input (Data):

Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc.

Process:

Process is the operation of data as per given instructions. It is totally internal process of the computer system.

Output (Information):

Output is the processed data given by computer after data processing. Output is also called result. We can save these results in the storage devices for future use.

Computer System

All of the components of a computer system can be summarized with the simple equations.

COMPUTER SYSTEM = HARDWARE + SOFTWARE+ USER

• Hardware = Internal Devices + Peripheral Devices

All physical parts of the computer (or everything that we can touch) are known as Hardware.

• Software = Programs

Software gives "intelligence" to the computer.

• USER = Person, who operates computer.

 

Features of Computer:-  

·         Processor

·         speed  reliability

·         accuracy

·         automation

·         diligence

·         consistency

·         no feelings


Thursday, November 11, 2021

Phishing Attack - 'Cyber Jaagrookta Diwas' (Awareness) Lect - 2 (06 Nov 2021)

 Types of Cybercrime


Phishing

Identity Theft

Cyber Stalking

Cyber Obscenity

Computer Vandalism

Ransomware

DDoS Attacks

Botnets

Social Engineering

PUPs

Prohibited/Illegal Content

Online Scams

Exploit Kits


Phishing Attack


Phishing is a type of cybersecurity attack that attempts to obtain data that are sensitive like Username, Password, and more. It attacks the user through mail, text, or direct messages. Now the attachment sends by the attacker is opened by the user because the user thinks that the email, text, messages came from a trusted source.


It is a type of Social Engineering Attack. For Example, The user may find some messages like the lottery winner. When the user clicks on the attachment the malicious code activates that can access sensitive information details. Or if the user clicks on the link that was sent in the attachment they may be redirected to a different website that will ask for the login credentials of the bank.



Types of Phishing Attack :



Spear Phishing –
This attack is used to target any specific organization or an individual for unauthorized access. These types of attacks are not initiated by any random hacker


Clone Phishing –
This attack is actually based on copying the email messages that were sent from a trusted source. Now the hackers alter the information by adding a link that redirects the user to a malicious or fake website.


Catphishing –
It is a type of social engineering attack that plays with the emotions of a person and exploits them to gain money and information. They target them through dating sites. It is a type of engineering threat.


Voice Phishing –
Some attacks require to direct the user through fake websites, but some attacks do not require a fake website. This type of attack is sometimes referred to as vishing. Someone who is using the method of vishing, use modern caller id spoofing to convince the victim that the call is from a trusted source. They also use IVR to make it difficult for the legal authorities to trace, block, monitor. It is used to steal credit card numbers or some confidential data of the user. This type of phishing can cause more harm.

SMS phishing –
These attacks are used to make the user revealing account information. This attack is also similar to the phishing attack used by cybercriminals to steal credit card details or sensitive information, by making it look like it came from a trusted organization. Cybercriminals use text messages to get personal information by trying to redirect them to a fake website. This fake website looks like that it is an original website.



Symptoms of the phishing :

  • It may request the user to share personal details like the login credentials related to the bank and more.

  • It redirects to a website if the user clicks on the link that was sent in the email.

  • If they are redirected to a website it may want some information related to the credit card or banking details of the user.

Preventive measures of phishing :

  • Do not try to open any suspicious email attachments.

  • Do not try to open any link which may seem suspicious.

  • Do not try to provide any sensitive information like personal information or banking information via email, text, or messages.

  • Always the user should have an antivirus 


'Cyber Jaagrookta Diwas' (Awareness) Lect - 1 (06 Nov 2021)

 

What is Cybercrime?


Cybercrime is any criminal activity that involves a computer, networked device or a network.


A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device.


Cybercrime also be referred as computer crime.


Crime that target computer networks or devices. These types of crimes include viruses and DoS attacks.


Crimes that use computer networks to advance criminal activities. These types of crimes include cyberstalking, phishing and fraud or identity theft.


Tips to prevent cyber crime Victim:


  1. Use Strong Passwords

Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.

  1. Secure your computer

Activate your firewall – Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.
Use anti-virus/malware software
Prevent viruses from infecting your computer by installing and regularly updating anti-virus software.

  1. Block spyware attacks

Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.

  1. Be Social-Media Savvy

Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private.

  1. Check your security settings.

Be careful what information you post online. Once it is on the Internet, it is there forever!

  1. Secure your Mobile Devices

Be aware that your mobile device is vulnerable to viruses and hackers.

Download applications from trusted sources.
Install the latest operating system updates
Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates.

Turn on automatic updates to prevent potential attacks on older software.

  1. Protect your Data

Use encryption for your most sensitive files such as tax returns or financial records

Make regular back-ups of all your important data, and store it in another location.

  1. Secure your wireless network

Wi-Fi (wireless) networks are vulnerable to intrusion if they are not properly secured.

  1. Review and modify default settings.

Public Wi-Fi, “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.

  1. Protect your e-identity

Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet.

Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).

  1. Avoid being scammed

Always think before you click on a link or file of unknown origin.

Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source.

Never reply to emails that ask you to verify your information or confirm your user ID or password.

  1. Call the right person for help

Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.


Sunday, October 24, 2021

Class 12 - Informatics Practices Pre Board Oct 2021 Result

 

Max Marks : 35

S.No.

Name

Marks

1

Parash Kumar

25

2

Mohd. Juber

28

3

Vikas Kumar

27

4

Aakash Gupta

27

5

Udai

32

6

Aditya Kumar Jaiswara

32

7

Aadarsh Jaiswal

27

8

Rishu Singh

29

9

Harsh Mandal

32

10

Sumit Chaudhary

32

11

Deepak

29


Class 12 - Computer Science Pre Board Oct 2021 Result


Max Marks : 35

S.No.

Name

Marks

1

Sameer Saha

12

2

Ajit Kumar

30

3

Kundan Kumar Rana

31

4

Abhishek

23

5

Imran Khan

27

6

Manish Singh

28

7

Atul

29

8

Abhay Pratap Dubey

29

9

Prince

27

10

Akash Verma

21

11

Vikas

28

12

Pratham

28

13

Sagar Upadhyay

28

14

Shailove Singh

25

15

Yugal Kishor Tiwari

24

16

Devesh Singh

30

17

Mayank Saraswat

27

18

Abhishek Jha

25

19

Yash Raj

29

20

Siddharth

21

21

Mahesh Kumar

15

22

Ujjval Jha

26

23

Sujeet Kumar

20

24

Lucky Bisht

20

25

Deepak Kumar Yadav

22

26

Anurag

25

27

Mohd Saad

15

28

Shubham Chaurasia

24

29

Nikhil

21

30

Nirdev

23

31

Manish Singh

22

32

Sumit

20

33

Vansh Tyagi

22

34

Gaurav

30

35

Aksh Gupta

30

36

Jwala Gupta

30