[go: up one dir, main page]

0% found this document useful (0 votes)
7 views5 pages

Computer Basics

Uploaded by

9248410818bh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Computer Basics

Uploaded by

9248410818bh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Computer Knowledge: Basics of networking and

cyber security
1.· Trojan horse is a type of malware that presents itself as legitimate software.
· It may perform actions on a computer that is genuine but will install malware
actions.

2.Wireless personal area is a network for interconnecting devices centred


around an individual person. The two current technologies for wireless personal
area networks are Infra-Red (IR) and Bluetooth (IEEE 802.15). These will allow
the connectivity of personal devices within an area of about 30 feet. However, IR
requires a direct line of site and the range is less.

3.Multipartite Virus infects and spreads in multiple ways. It can infect both
program files and system sectors.
Macro Virus - Such viruses spread when an infected document is opened, often
through e-mail attachments.
Direct Action Virus - This virus comes into action when a file containing virus is
executed. It remains dormant otherwise.
Polymorphic Virus - This virus changes its code each time an infected file is
executed. It does this to evade antivirus programs.

4.Ransomware is a type of malware program that infects and takes control of a


system.
· It infects a computer with the intention of extorting money from its owner.

5.Hacking refers to activities that seek to compromise digital devices, such as


computers, smartphones, tablets, and even entire networks.
Besides social engineering and malvertising, common hacking techniques include:
Ø Botnets
Ø Browser hijacks
Ø Denial of service (DDoS) attacks
Ø Ransomware
Ø Rootkits
Ø Trojans
Ø Viruses
Ø Worms

6.Hacking is an attempt to exploit a computer system or a private network inside


a computer. It is the unauthorized access to or control over computer network
security systems for some illicit purpose.
Ransomware is a type of malware program that infects and takes control of a
system. It infects a computer with the intention of extorting money from its owner.
7.A Firewall is a network security system that monitors and controls overall
incoming and outgoing network traffic based on advanced and a defined set of
security rules.

8.Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending
emails across the Internet.
By default, the SMTP protocol works on three ports:
Port 25 - this is the default SMTP non-encrypted port;
Port 2525 - this port is opened on all SiteGround servers in case port 25 is filtered
(by your ISP for example) and you want to send non-encrypted emails with SMTP;
Port 465 - this is the port used if you want to send messages using SMTP
securely.
Internet Message Access Protocol, or IMAP, is a standard email
retrieval (incoming) protocol. It stores email messages on a mail server and
enables the recipient to view and manipulate them as though they were stored
locally on their device(s) .
Post Office Protocol 3, or POP3, is the most commonly used protocol
for receiving email over the internet. This standard protocol, which most email
servers and their clients support, is used to receive emails from a remote server
and send to a local client.

9.Full disk encryption (FDE) is a security mechanism used to protect data at rest
on storage devices and provides a level of protection against loss of data if the
device itself is lost or stolen. Full disk encryption (FDE) is the use of encryption
software to convert all information on a disk to unreadable code that can only be
read by someone with a secret key. Unlike file-level encryption, full disk
encryption uses hardware or software to encrypt all data that is written to the h ard
drive, including the operating system and it's critical files. Encrypting the entire
device helps ensure all data on the device is secure, not just selected files and
folders. Also, since encryption and decryption is done as needed, the end user
does not need to remember to encrypt sensitive files. It happens automatically.

10.Modem (Modulator-Demodulator) is a hardware component that allows a


computer to connect to the Internet.
· It converts analog signal to digital signal.
· Modems are referred to as an asynchronous device, meaning that the device
transmits data in an intermittent stream of small packets.
· Once received, the receiving system then takes the data in the packets and
reassembles it into a form the computer can use.

11· Phishing is a recent forms of cyber attack in which scammers/attackers make


the Internet users divulge sensitive information about their bank accounts and
personal details.
· The tactic of using e-mail to solicit sensitive information from users is
called phishing.
· The attackers are able to target Internet users due to some inherent weakness
in web browsers and other technical aspects of the Internet.

12.Smurfing is a type of denial-of-service attack that relies on flooding a network


with a large volume of traffic through the manipulation of IP addresses in that
network.
· This type of attack can result in a high volume of excess activity, which can
overwhelm a server or IT setup.

13. Stuxnet is a computer worm that was originally aimed at Iran's nuclear
facilities and has since mutated and spread to other industrial and energy-
producing facilities.
· The original Stuxnet malware attack targeted the programmable logic controllers
(PLCs) used to automate machine processes.
· It generated a flurry of media attention after it was discovered in 2010 because it
was the first known virus to be capable of crippling hardware and because it
appeared to have been created by the U.S. National Security Agency, the CIA,
and Israeli intelligence.

14.· Destroying data by gaining unauthorized access to the network is called


as cracking.
· Crackers are kind of bad people who break or violate the system or a computer
remotely with bad intentions to harm the data and steal it.
· There works are always hidden as they are doing illegal stuff .
· Bypasses passwords of computers and social media websites, can steal your
bank details and transfer money from the bank.

15.· Antivirus software can also be called a security utility.


· Antivirus software guards against viruses entering into the computer.
· It scans, detects and deletes such viruses from the computer.
· Once installed, they run automatically in the background to facilitate real -time
protection against virus attacks.

16.· Antivirus software is a class of program designed to prevent, detect and


remove malware infections on individual computing devices, networks and IT
systems.
· Norton provides industry-leading antivirus and security software for PCs, Mac,
and mobile devices.

17· Hacking is an attempt to exploit a computer system or a private network


inside a computer. It is the unauthorized access to or control over computer
network security systems for some illicit purpose.
· Viruses, Keyloggers, Rootkit, Spoofing attack, Packet Sniffer, Trojan horse,
Password cracking are various techniques for hacking.
· A botnet is a collection of internet-connected devices, which may include
personal computers (PCs), servers, mobile devices and internet of things (IoT)
devices that are infected and controlled by a common type of malware, often
unbeknownst to their owner.

18.· A computer virus is a type of malicious software, or malware, that spreads


between computers and causes damage to data and software.
· Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage.
· A key thing to know about computer viruses is that they are designed to spread
across programs and systems and networks and it is difficult to trace it.
· Computer viruses typically attach to an executable host file, which results in
their viral codes executing when a file is opened.
· The code then spreads from the document or software it is attached to via
networks, drives, file-sharing programs, or infected email attachments.

19· Overwrite viruses are extremely dangerous as they can delete data and
replace it with their own file content or code.
· Once files get infected, they cannot be replaced, and the virus can affect
Windows, DOS, Linux, and Apple systems.
· The only way this virus can be removed is by deleting all of the files i t has
infected, which could be devastating.
· The best way to protect against the overwrite virus is to use a trusted antivirus
solution and keep it updated.

20.The five components of a computer network are:


· Sender (Device)
· Sender Equipment (Encoder)
· Communication Channel (Cables, Wireless)
· Receiver Equipment (Decoder)
· Receiver (Device)

21.In computer media, write once, read many, or WORM, is a data storage
technology that allows data to be written to a storage medium a single time and
prevents the data from being erased or modified.

22.IP' stands for 'Internet Protocol'. There are two versions of IP that currently
coexist in the global Internet: IP version 4 (IPv4) and IP version 6 (IPv6). IP
addresses are made up of binary values and drive the routing of all data over the
Internet. IPv4 addresses are 32 bits long, and IPv6 addresses 128 bits long.

23.The data transfer rate (DTR) is the amount of data in digital form that is
moved from one place to another in a given time on a network. As studied before,
the greater the bandwidth of a given medium, the higher is the data transfer
rate. This can also be referred to as throughput, although data transfer rate
applies specifically to digital data streams. Data transfer rate is often measured in
bits per second (bps), although the unit baud , which is one bit per second is also
used. It is commonly used to measure how fast data is transferred from one
location to another. For example, your ISP may offer an Internet connection with a
maximum data transfer rate of 4Mbps

24.Types of Viruses
File Virus: These viruses infect and replicate when it gets attached to MS-DOS
program files with EXE or COM extensions.
Boot sector virus: These viruses infect the boot sector of floppy disks or hard
drives. Boot sector of a drive contains program that participates in booting the
system. A virus can infect the system by replacing or attaching itself to these
programs

25.RJ-45 , short form of Registered Jack - 45 , is an eight wired connector


that is used to connect computers on a local area network(LAN), especially
Ethernet. RJ-45 connectors look similar to the RJ-11 connector used for
connecting telephone equipment, but they are somewhat wider.

You might also like