Students can easily access the best AI Class 10 Notes Chapter 3 Basic ICT (Information and Communication Technology Skills) Skills Class 10 Notes for better learning.
Class 10 AI Basic ICT Skills Notes
Operating Systems: Windows 10 Class 10 Notes
What is an Operating system:
An Operating System (OS) is a canvas between a user and computer hardware. An operating system is a system software that is responsible for all the basic tasks in a computer like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.
Some of the most used Operating Systems include Linux, Windows Operating System, VMS, OS/400, z/ OS, etc.
SOME EXAMPLES of an OS:
MS-DOS: DOS (Disk Operating System) was one of the primitive, widely-used operating system for personal computers. It is a system program that is automatically runs on starting the computer. It is a single-user operating system from Microsoft.
UNIX: UNIX operating system is developed by Sun Microsystems, Silicon Graphics, IBM, and a number of other companies. The UNIX environment and the client/server program model played important role in the development of the Internet and the reshaping of computing in networks rather than in stand alone machines.
WINDOWS: Windows is an operating system from Microsoft that, together with some commonly used business applications such as Microsoft Word, Excel, PowerPpint etc. has become a popular “standard” software suite for individual users in most corporations as well as in most homes.
MACINTOSH: The Macintosh (often called “the Mac”), introduced in 1984 by Apple Computer, was the first widely-sold personal computer with a graphical user interface (GUI).
Types of Operating System:
Batch Operating System: A Batch Operating System is a type of operating system that processes and executes tasks in groups or batches without requiring continuous user interaction. In this system, users submit a set of jobs or tasks in advance, and the operating system automatically processes these jobs sequentially without the need for immediate user input during execution.
Time-sharing Operating Systems: Time-sharing is a technique used in operating systems, which enables multiple people, located at various terminals, to use a particular computer system at the same time. Processor’s time is shared among multiple users simultaneously to process each user’s job.
Multiprogramming Operating System: Thus, it is evident that a time-sharing system is a multiprogramming system, but a multiprogramming system may not necessarily be a time-sharing system.
Multiprocessing System: A multiprocessing system is a system that works with multiple processors and memories.
Distributed Operating System: Distributed systems use multiple central processors connected together to process multiple real-time applications and multiple users. Data processing jobs are distributed among the processors accordingly.
Network Operating System: A Network Operating System (NOS) is a specialised operating system designed to facilitate and manage network resources and operations within a computer network. Unlike standalone operating systems that primarily focus on managing a single computer, a Network Operating System is tailored to support the coordination and communication among multiple computers and devices connected in a network.
Real-Time Operating System: A real-time operating system is a system in which jobs are processed within fixed deadlines. Here the time interval required to process and respond to inputs is so small that it controls the environment.
Functions of OS:
The main functions of an operating system are as follows:
Process Management: Process Management in an operating system involves the efficient execution and coordination of various programs, known as processes. The OS oversees the scheduling, creation, and termination of processes, ensuring optimal utilisation of the CPU and effective intercommunication among. these processes. This function is essential for managing the execution of user programs and handling system activities, contributing to the overall efficiency and responsiveness of the operating system.
Memory Management: Management of the memory space and the processes running in it, allocation of memory to processes, are all the prime functions of the OS. The CPU fetches data and instructions from and stores in memory. Among the roles of OS in memory management are:
Controlling and managing the parts of memory currently being used and by whom.
Allocation and release of memory space as needed.
Management of the disk space: The management of disk space in an operating system involves organising and allocating storage resources on a computer’s disk. The OS oversees the creation, deletion, and organisation of files and directories, ensuring efficient utilisation of available disk space. This function is crucial for maintaining a structured file system, preventing data fragmentation, and facilitating smooth storage operations, contributing to effective data management and system performance.
I/O Management: I/O (Input/Output) Management in an operating system involves overseeing the communication and data transfer between the computer and its external devices. The OS is responsible for coordinating input and output operations, managing device drivers, and optimising data flow. This function ensures efficient utilisation of peripherals, minimises bottlenecks, and enhances overall system performance by streamlining communication between the computer and external devices.
File Management: Management of files in the disks, their retrieval as and when required, searching, removal are all the primitive file management tasks of the operating system.
Protection: The Protection function of an operating system involves implementing security measures to safeguard the computer system and its resources. It includes mechanisms to control access to files, data, and system functionalities, ensuring that only authorised users or processes can perform specific operations. Protection mechanisms prevent unauthorised access, modifications, or disruptions, contributing to the overall security and integrity of the computer system.
Command Interpretation: The operating system is also responsible for command interpretation. The command interpreter is the primary interface between the user and the rest of the system.
Windows 10:
Windows 10 is one of the most recent versions of Windows from Microsoft. It was released in 2015 and was initially offered free of charge to users of Windows 7 and Windows 8.1. Windows 10 combines features from the two previous Operating System versions. Microsoft has replaced the Start screen tiles from Windows 8, and brought back the Start Menu. They also removed the vertical toolbars that appeared from the sides of the screen. These changes make this Windows version easier to use for users of both desktop/laptops and mobile devices.
The Desktop Screen of Windows 10
Windows 10 Special Features:
Windows 10, as an operating system, incorporates several special features to enhance user experience and functionality. Some key features include:
- Cortana: Microsoft’s virtual assistant that allows users to interact with their devices using voice commands and provides personalised assistance.
- Start Menu: The Start Menu combines elements of the traditional menu with Live Tiles, offering a customizable and dynamic interface for launching applications.
- Task View: Enables users to create virtual desktops, helping organise and switch between different sets of open applications.
- Microsoft Edge: A modern web browser introduced in Windows 10 , offering improved performance, security features, and integration with Cortana.
- Windows Ink: Designed for touch-enabled devices, Windows Ink provides tools for creating and editing content using a digital pen or stylus.
- Continuum: A feature that adapts the interface based on the device type, providing a seamless experience whether using a desktop or a tablet.
- Windows Hello: Biometric authentication methods, such as fingerprint recognition or facial recognition, to enhance device security and simplify logins.
- Action Center: A centralised hub for notifications and quick access to commonly used settings, making it easier for users to stay informed and manage their system preferences.
- Universal Windows Platform (UWP) Apps: Apps developed for the UWP framework can run across various Windows
- devices, offering a consistent experience on desktops, tablets, and smartphones.
These features contribute to Windows 10 ‘s versatility, providing a modern and user-friendly environment for a wide range of devices and user preferences.
Useful Applications of Desktop:
- Recycle Bin: The Recycle bin Stores the deleted files temporarily. Files may be recovered from here if required.
- This PC: Shows a list of drives and devices attached to the computer
- Control Panel: An area for making various settings to hardware and software.
- Taskbar: A horizontal bar having shortcuts to applications, Date/Time, notifications, the start menu, etc.
Useful Shortcuts of Windows 10:
Windows 10 Start Menu:
To start any application in Windows10, open the Start Menu and click “All Applications”. This opens a list of all the applications installed on the computer.
The Windows 10 Start Menu has two panes.
Left Pane:
Following can be done from the left pane:
- Make account settings or log in with another user
- Access the most frequently used applications.
- A small arrow next to an application will open a submenu with a list of recent documents opened with that application.
- Open the “File Explorer” to navigate your folders and files.
Changing computer settings like:
- Internet connection or desktop background.
- See different options to shut down your computer
- See a list of all the applications installed in your computer.
- Search Box:The “Search box” on the Taskbar allows to search within your documents, files or on the Web for anything.
The icons on the left side of the menu do the following:
The Gear icon will allow you to configure the settings of your Search.
This icon will let you send Feedback to Microsoft on what you like or dislike about Windows.
The Cortana icon will activate Windows’ new personal assistant.
Right Pane:
The right pane features a varied array of tiles, similar to the ones that were seen on the Start Screen of Windows 8. These tiles can be moved and dragged to different places by holding the mouse button.
Windows 10: Taskbar
The taskbar of Windows 10 resides at the bottom of the screen giving the user access to the Start Menu, icons of frequently used applications. The right-side of the Taskbar has the Notification Area which informs the user of different things like the state of the Internet connection or the charge of the laptop battery.
The middle of the Taskbar contains “pinned” applications, which provide quick access to applications used frequently.
To Unpin an Application from the Taskbar To “unpin” it, just right-click the icon in the Taskbar and select “Unpin from taskbar”. You can “pin” it back again any time you want.
Notification Area
The Notification Area is present at the right side of the Taskbar which shows different types of notifications from your computer like your Internet connection, or the volume level.
The Notification Area shows a limited amount of icons. You can click the upward arrow on its left-side to see other icons as well.
Task View: The Task View feature allows you to navigate within the open Windows and applications. It may also be accessed by the “Task View” button from the Taskbar.
Other alternatives are: Hold the Windows key, and then press Tab By pressing the Alt+Tab keyboard shortcut also serves a similar purpose.
Windows 10: Cortana Cortana is Microsoft’s intelligent personal assistant. It is included in Windows 10, as well as with other Microsoft systems and devices like Windows Phones and Xbox. Cortana helps to find things in your computer, set appointments, answer questions, and many other things.
To use Cortana simply type a question in the search box in the Taskbar, or click the microphone icon and talk to Cortana.
The icons on the left-side are for:
- Home
- Notebook
- Reminders
- Feedback
Home is the initial Cortana window where you can type or ask questions.
Drives in Windows 10:
- A drive, or disk drive, is a hardware on which you can store files and folders. Disk drives are assigned a letter.
- Your hard drive (the drive inside your computer) is known as the (C:) drive.
- Your floppy disk drive is known as the (A:) drive.
- If your computer has a CD-ROM drive, it is usually called (D:).
- Choose where you’ll save your files during the Save As process. Most users store their files on the (C:) drive.
Recycle Bin:
The Recycle Bin provides temporary storage for deleted files. If a file is accidentally deleted, it may be recovered by selecting the file and clicking “Restore this item”. To permanently remove all files, click Empty the Recycle Bin.
Retrieving files from the Recycle Bin: Using the “Restore all items link” (located in the Recycle Bin Manage Group) will retrieve all files and folders in the Recycle Bin back to their original locations on your computer.
Emptying the Recycle Bin: Emptying the Recycle Bin permanently removes items. From this point, they cannot be recovered.
To empty the Recycle Bin: Click the Empty the Recycle Bin link in the Recycle Bin Manage group.
Windows 10: User Management
Windows 10 allows you to login to different user accounts when using your computer.
The logged in user account may be managed also by:
- Open the Start Menu.
- Click on Settings.
- From the SETTINGS window, choose Accounts option.
- In the ACCOUNTS window, choose the account setting you want to configure.
Under Sign-in options, Password can be changed.
Windows 10 Quick Actions:
Quick Actions are a set of tiles that give you access to frequently used settings and tasks (like Wi-Fi connection, or screen brightness).
Most of the actions can be configured simply by clicking or tapping on the tile. Additional settings and options can be accessed if you right-click the tile.
Selecting the All settings tile will take you directly to the SETTINGS window.
Customising Quick Actions: With these Notifications, you can customise the Quick Actions tiles by going to the SETTINGS window.
After opening Settings, you can choose SYSTEM and then select Notifications & actions.
Files and Folders in Windows 10 Class 10 Notes
Files and folders are the basic storage area of data in all different forms The files store the raw data, the folders are the containers of files.
Files store the actual information. All of the information stored in a computer is stored in files. There are many different types of files, including operating system files, program files, and more.
Folders keep the files organised and easily searchable.
Folders can further contain subfolders.
File Organisation, Directory Structures, And FileSystem Structures
File organisation, directory structures, and file-system structures are fundamental aspects of operating systems that facilitate the effective storage and retrieval of data. Here is a brief explanation of each:
File Organisation:
- Definition: File organisation refers to the arrangement of data within files to enable efficient access and retrieval.
- Purpose: Organising data optimally improves access times, facilitates searching, and enhances overall system performance.
- Methods: Common methods include sequential, random, and indexed file organisation.
Directory Structures:
- Definition: Directory structures organise files into a hierarchical or tree-like arrangement, forming a logical structure for file storage.
- Purpose: Directory structures provide a systematic way to categorise and locate files, simplifying file management and enhancing user navigation.
- Types: Common types include single-level, two-level, and tree-structured directory systems.
File-System Structures:
- Definition: File-system structures represent the overall organisation of files and directories, including methods for storing, naming, and accessing data.
- Components: Key components include the file control block (FCB), which stores metadata about each file, and the free-space management system.
- Access Methods: File systems employ various access methods, such as sequential, direct, and indexed access, to retrieve data efficiently.
In summary, file organisation focuses on the internal structure of individual files, directory structures provide a hierarchical arrangement for organising files, and filesystem structures encompass the overall organisation and management of files within an operating system. These concepts collectively contribute to efficient data storage, retrieval, and organisation.
File Explorer in Windows 10:
File Explorer is the application by which file management is done by Windows operating system. It provides a graphical interface for the user to navigate and access the files stored in the computer.
File Explorer can be accessed by clicking the folder icon in the Taskbar.
Views in a Folder: Large icons, Extra large icons, Medium icons, Small icons, List, Details, Tiles, Content
The initial File Explorer window is comprised of the following sections:
- The File Explorer ribbon is equipped with buttons for executing common tasks related to managing files and folders.
- The Navigation Pane provides entry points to document and picture libraries, as well as storage devices, including frequently used folders and network devices.
- The right section of the window displays the Frequent folders, offering quick access to recently utilised folders.
- Located in the lower part of the window, the Recent files section showcases recently opened files and documents for easy retrieval.
The File Explorer Ribbon:
In Windows 10, the File Explorer features an updated ribbon toolbar reminiscent of the one present in recent versions of Microsoft Office. This ribbon is equipped with buttons and commands tailored for the most frequently performed tasks.
The Ribbon encompasses four tabs housing various commands. Within the Home tab, users can execute tasks such as:
- Copying and pasting files and folders between different locations.
- Moving files and folders to an alternative location.
- Duplicating files and folders to another designated location.
- Permanently deleting a file or folder or moving it to the Recycle Bin.
- Renaming a file or folder.
- Establishing a new folder or other items.
- Verifying or modifying the Properties of a document or folder.
- Opening a file or folder.
- Utilising different options to select single or multiple files and folders.
- The Share ribbon gives you different options to share your files and folders.
- E-mailing or messaging a file.
- Compressing (“Zip”) a folder to take less space.
- Printing or faxing documents.
- Sharing with other users or networks.
The View ribbon empowers users to customise the display of files and folders in Windows. Various modifications that can be implemented include:
- Incorporating additional panes to showcase file previews or details.
- Altering the layout of files and folders, transitioning between icons, list view, and other options.
- Sorting and arranging the contents within a folder.
- Concealing specific folders or files as needed.
File and Folder operations:
File and folder operations encompass a range of tasks related to managing digital data. These operations are fundamental for organising, manipulating, and accessing files and folders on a computer. Key file and folder operations include:
To copy a file or folder:
- Highlight the file or folder that is to be copied. Right click and select Copy.
- Navigate to the desired location.
- Right click and select Paste
To move a file or folder:
- Highlight the file or folder that is to be moved. Right click and click Cut.
- Navigate to the desired location,
- Right click and select Paste
To delete a file or folder:
- Highlight the file or folder that is to be deleted.
- Press the Delete key from keyboard or Right click and select Delete option or Choose Delete this folder from the File and Folder Tasks menu
- The Delete Folder dialog box displays to confirm the Delete request, Click Yes.
Renaming Files and Folders:
A common file management task is renaming files and folders.
To rename files and folders:
- Locate the file or folder, and press the right mouse button. A shortcut menu appears.
- Choose Rename from the shortcut menu.
- Delete the old file name.
- Key the new file name, and press Enter.
To create a new folder:
- Choose the location where you want to create the folder
- Right click
- Select New → Folder
- A new folder icon appears
- Write the name of the new folder
- Press Enter
Computer Maintenance and Security Class 10 Notes
What is computer maintenance: Computer maintenance refers to the set of activities and practices undertaken to ensure the optimal functioning, reliability, and longevity of computer systems and associated hardware and software components. It involves routine tasks, inspections, and repairs aimed at preventing potential issues, addressing existing problems, and enhancing overall performance.
Computer maintenance is a proactive approach to minimise the risk of hardware failures, software glitches, and security breaches, ultimately contributing to a more reliable and efficient computing environment. Regular maintenance practices help extend the lifespan of computer systems and contribute to a smoother user experience.
Importance of computer maintenance:
The importance of computer maintenance lies in its role as a proactive and preventive strategy to ensure the optimal performance, reliability, and longevity of computer systems. Several key factors highlight the significance of computer maintenance:
Enhanced Performance: Regular maintenance activities, such as cleaning hardware components, optimising software settings, and removing unnecessary files, contribute to improved system speed and responsiveness.
Reliability and Stability: Scheduled maintenance helps identify and address potential issues before they escalate into critical problems. This proactive approach enhances the overall reliability and stability of computer systems.
Data Protection: Implementing regular backups and recovery plans as part of computer maintenance safeguards critical data from loss, corruption, or accidental deletion. This is crucial for preserving important files and ensuring business continuity.
Security Measures: Keeping software and security systems up-to-date through maintenance practices helps protect computers from emerging threats, viruses, and malware. Regular updates and patches address vulnerabilities, reducing the risk of security breaches.
Longevity of Hardware: Routine checks, cleaning, and proper cooling methods implemented during maintenance contribute to the extended lifespan of hardware components. This can postpone the need for costly hardware replacements.
Improved User Experience: A well-maintained computer system provides a more efficient and enjoyable user experience. Users can work with confidence, knowing that their systems are less prone to unexpected failures or disruptions.
Cost Savings: Proactive maintenance is cost-effective in the long run. By addressing potential issues before they become major problems, organisations can avoid expensive repairs, data recovery expenses, and unplanned downtime.
Optimal Software Functionality: Keeping software applications updated ensures that users benefit from the latest features, improvements, and security patches. This contributes to the smooth operation of software programs.
Compliance and Regulations: In certain industries, compliance with data protection regulations and industry standards is crucial. Regular computer maintenance helps organisations adhere to these requirements, avoiding legal and financial consequences.
Cleaning Computer components:
Cleaning computer components is the process of removing dust, debris, and contaminants from various hardware elements within a computer system. This maintenance practice aims to prevent overheating and performance issues by ensuring optimal airflow and cooling. It involves physically cleaning components such as the central processing unit (CPU), cooling fans, power supply unit, and other internal and external parts. Regular cleaning helps maintain the efficiency of these components, reduces the risk of hardware failures, and contributes to the overall longevity and reliability of the computer system.
Cleaning Tools For Physical Components:
Cleaning computer components involves using various tools to remove dust, debris, and contaminants from both internal and external hardware. These tools are essential for maintaining optimal performance and preventing issues related to overheating. Here are some common cleaning tools for physical components:
Compressed Air Duster: This tool emits a powerful stream of compressed air, allowing users to blow away dust from intricate and hard-to-reach components, such as between keyboard keys, cooling fans, and other tight spaces.
Anti-Static Brushes: Designed with soft bristles, anti-static brushes help gently sweep away dust and particles from sensitive electronic components, such as circuit boards, without causing damage due to static electricity.
Microfiber Cloths: Soft and lint-free microfiber cloths are suitable for wiping down surfaces and screens. They are effective in removing fingerprints, smudges, and light dust without scratching the components.
Isopropyl Alcohol: Applied with a soft cloth or cotton swab, isopropyl alcohol is useful for cleaning stubborn residues, thermal paste, or sticky substances on components. It evaporates quickly, leaving no residue.
Cotton Swabs: Cotton swabs are ideal for detailed cleaning in small and delicate areas. They can be used with isopropyl alcohol to clean connectors, ports, and other intricate parts.
Vacuum Cleaner with Attachments: A small, handheld vacuum cleaner with appropriate attachments can be used to suction dust from vents, fans, and other openings without introducing static electricity.
Screen Cleaning Solutions: For monitors and screens, specially formulated screen cleaning solutions can be used with microfiber cloths to remove smudges and dirt without damaging the display.
Disposable Compressed Air Canisters: Similar to compressed air dusters, disposable compressed air canisters provide a portable and convenient solution for quick dusting of components.
It’s essential to exercise caution and follow proper safety measures when using cleaning tools, ensuring the computer is powered off and unplugged before cleaning. Additionally, users should refer to their device’s manual for manufacturer-recommended cleaning methods to avoid any potential damage to sensitive components. Regular cleaning with these tools helps maintain a clean and efficient computer system, promoting longevity and optimal performance.
Preparing Maintenance Schedule:
Preparing a maintenance schedule involves creating a systematie plan to conduct regular and preventive maintenance activities for various components and systems within a specified timeframe. This schedule outlines the intervals at which maintenance tasks should be performed to ensure the efficient operation, reliability, and longevity of equipment and facilities. The process includes identifying key maintenance activities, setting appropriate timelines, and allocating resources for inspections, repairs, and other preventive measures.
Here are key components of a maintenance schedule:
Physical Cleaning Schedule:
- Objective: Ensure the external components of the computer system are free from dust and debris, promoting optimal airflow and preventing overheating.
- Tasks: Wipe down surfaces, clean keyboard and mouse, use compressed air to remove dust from vents and fans.
- Frequency: Monthly or as needed based on environmental conditions.
Internal Cleaning Schedule:
- Objective: Address dust accumulation inside the computer to prevent heat-related issues and maintain hardware efficiency.
- Tasks: Use compressed air to clean internal components, inspect and clean cooling fans, and ensure proper ventilation.
- Frequency: Quarterly or as recommended by hardware specifications.
Backup Schedule:
- Objective: Safeguard data against loss or corruption by regularly creating backup copies.
- Tasks: Perform full and incremental backups of important files and system configurations.
- Frequency: Regularly scheduled backups, with more frequent backups for critical data.
Update Schedule:
- Objective: Keep the operating system, software, and security applications up-to-date to patch vulnerabilities and ensure optimal performance.
- Tasks: Install operating system updates, software patches, and security updates.
- Frequency: Regularly check for updates and schedule installations during periods of low activity.
These components contribute to a comprehensive maintenance schedule that addresses both the physical and digital aspects of computer system care. Regular adherence to this schedule helps prevent hardware issues, safeguard data, and maintain the overall health and efficiency of the computer system.
Protecting computer against viruses:
Protecting a computer against viruses involves implementing various security measures to prevent, detect, and eliminate malicious software. Here are key strategies for safeguarding a computer against viruses:
Install Antivirus Software:
- Utilise reputable antivirus software to provide realtime protection against known and emerging threats.
- Keep the antivirus software updated to ensure it can identify and neutralise the latest viruses.
Enable Firewall Protection:
- Activate the computer’s built-in firewall or install a third-party firewall to monitor and control incoming and outgoing network traffic.
- Configure firewall settings to block unauthorised access and protect against malware.
Regular System Updates:
- Keep the operating system, software, and applications up-to-date with the latest security patches.
- Enable automatic updates to ensure timely installation of patches and fixes.
Exercise Caution with Email Attachments:
- Avoid opening email attachments from unknown or suspicious sources.
- Use email filters and be cautious of phishing attempts to prevent virus-laden attachments.
Secure Web Browsing:
- Install browser security extensions to block malicious websites.
- Be cautious when clicking on links, and avoid downloading files from untrusted websites.
Use Strong Passwords:
- Employ strong, unique passwords for all accounts to prevent unauthorised access.
- Enable two-factor authentication (2FA) for an additional layer of security.
Regular Backups:
- Create regular backups of important data to an external storage device or cloud service.
- In the event of a virus or malware infection, data can be restored from a clean backup.
Educate Users:
- Provide cybersecurity awareness training to users, emphasising safe online practices.
- Encourage users to be vigilant and report any suspicious activities or potential security threats.
Scan External Devices:
- Run antivirus scans on external devices (USB drives, external hard drives) before connecting them to the computer.
- External devices can be a potential source of virus transmission.
Monitor System Performance:
Regularly check for unusual system behaviour, unexpected pop-ups, or performance issues that may indicate a virus infection.
Investigate and address any anomalies promptly. By implementing these measures, users can significantly reduce the risk of virus infections and enhance the overall security posture of their computers.
Types of Threats:
Malware: Malware is a general term used for Malicious software. Any software developed with an intention to damage computer, digital devices ,hardware, steal data,” or cause any other trouble to the user
Viruses, Worms, Ransomware, Trojans, and Spyware are some of the kinds of malware.
Virus: A virus is a malicious software created to disturb normal activities of resources of a computer system like CPU time, memory, personal files, or steal sensitive information.
Some of the most common activities of viruses include stealing passwords or data, corrupting files, spamming the user’s email contacts. Some well-known viruses include CryptoLocker, MyDoom, Sasser and Netsky, Slammer etc.
Worms: It is a malware that induces unexpected or damaging behaviour on an infected computer system. The major difference between a worm and a virus is that unlike a virus, a worm does not need a host program or software to insert its code into. Worms are standalone programs that are capable of working on its own. Also, a virus needs human triggering for multiplication. Some prominent examples of worms include Sobig, MSBlast, Code Red, Nimda, Morris Worm, etc.
Ransomware: It is a type of malware that aims towards stealing user data. It either blocks the user from accessing their own data or threatens to publish the personal data online and demands ransom payment against the same.
Trojan: A Trojan is a malware, which seems to be a legitimate software and once it tricks a user into installing it, it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect other files, it spreads through user interaction.
Spyware: It spies on a person or an organisation by gathering information about them, without the knowledge of the user. It records and sends the collected information to an external entity without consent or knowledge of the user
Adware: An Adware is a malware that is created to generate revenue for its developer. An adware displays online advertisements using pop-ups, web pages, or installation screens.
Keyloggers: A keylogger can either be malware or hardware. The main purpose of this malware is to record the keys pressed by a user on the keyboard.
Spam: Spam is a broad term and applies to various digital platforms like messaging, forums, chatting, emailing, advertisement, etc. However, the widely recognised form is email spam.
Network Security Threats:
- Denial of Service: Denial of Service (DoS) is a kind of attack, wherein an attacker limits or stops an authorised user to access a service, device, or any such resource by overloading that resource with illegitimate requests.
- Intrusion Problems: Network Intrusion refers to any unauthorised activity on a computer network. These activities may involve unauthorised use of network resources (DoS) or threatening the security of the network and the data.
- Snooping: Snooping means secretly listening to a conversation. In the context of networking, it refers to the process of secret capture and analysis of network traffic.
- Eavesdropping: Eavesdropping is an unauthorised real-time interception or monitoring of private communication between two entities over a network.
Software Safety, Security and Care:
Regular computer maintenance can help prevent hardware problems, software problems, and data loss. It can also help your computer run smoothly and efficiently, which can improve your productivity and save your time.
The software running in a system is prone to attacks from different threats and needs to be protected.
Preventive measures:
- Using antivirus, anti-malware, and other related software and updating them on a regular basis.
- Configure your browser security settings
- Always check for a lock button in the address bar while making payments.
- Taking a regular backup of important data.
- Enforcing firewall protection in the network.
- Avoid entering sensitive (passwords, pins) or personal information on unknown or public computers.
- Avoid entering sensitive data on an unknown network (like Wi-Fi in a public place) using your own computer also.
- Avoid clicking on links or downloading attachments from unsolicited email.
- Scan any removable storage device with an antivirus software before transferring data to and from it.
Antivirus: Antivirus is a software, also known as Antimalware. Initially antivirus software was developed to remove viruses only, hence the name Antivirus. However, with time it is developed for detection, prevention and removal of a wide variety of malware.
Firewall: Computer firewall is a network security system designed to protect a trusted private network from unauthorised access or traffic originating from an un trusted outside network.
Utility tools of Windows 10 Utility Software:
Utility Software is a type of software which is used to analyse and maintain a computer. This software may come with OS like windows defender and disk cleanup tools. Antivirus, backup software, file manager, and disk compression tool all are utility software.
Disk Cleanup Tool:
Disk Cleanup utility inspects the hard disk and looks for files that can be safely deleted.
Deleting unnecessary files frees up valuable disk space. To run Disk Cleanup:
Choose Start → Windows Administrative Tools → Disk cleanup
The Disk Cleanup window opens.
Disk Cleanup lists several potential files that can be deleted, as well as the amount of disk space you’ll gain by emptying each one.
To learn more about a file category, click it and click the View Files button. A description appears.
Click the check boxes next to the categories you want to delete, then click OK.
A dialog box appears asking whether you are sure you want to perform these actions. Click Yes or No as appropriate.
Disk Defragmenter: It is an utility used to reconstruct broken fragments of files, so that they can be accessed faster when required. The hard disk acts as your computer’s storage area. Almost everything installed on your computer-applications, files, folders, and the operating system-is stored here.
In normal use the hard disk can become fragmented. This means parts of the same disk file become scattered over different areas of the disk. A fragmented hard disk slows down the computer.
To keep the hard disk’running smoothly, you must routinely defragment, or “defrag” the hard disk. The Disk Defragmenter tool can help you do this.
To use Disk Defragmenter:
Choose Start → Windows Administrative Tools → Defragmenter and optimise drives.
The Disk Defragmenter opens.
Antivirus “Software: An antivirus software protects a system from virus and other malware. It detects a virus and notifies the user and takes action to secure the computer. User can itself instruct antivirus to delete malicious program, put it in vault or even ignore it. Some examples of Antivirus Softwares are:
- Windows Defender
- AVG
- AVAST
Compression Tool: These tools are used to reduce the size of a file so that they can be stored or carried in devices. Most operating systems include tools for compressing and uncompressing files.
Some Examples of compression software are as below.
- WinAce
- WinZip
- WinRar
5. Disk Management Tool: Disk Management is an utility introduced in Window 10 as a replacement of the fdisk command. It enables us to view or manage the disk drives installed in their computer and the partition associated with those drives.
Some disk management tools are:
- Mini Tool Partition Wizard
- Paragon Partition Manager