Professional Documents
Culture Documents
GROUP MEMBERS
Stay Safe!
QUESTIONS:
1. What will be the output of the following code?
<!DOCTYPE html>
<html>
<head>
<style>
table, th, td {
border: 1px solid black;
}
</style>
</head>
<body>
<table >
<tr>
<th> Roll No. </th>
<th> Student Name </th>
<th> Subject Name </th>
</tr>
<tr>
<td> 1 </td>
<td>Ram</td>
<td> Physics </td>
</tr>
<tr>
<td> 2 </td>
<td> Shyam </td>
<td> Math </td>
</tr>
<tr>
<td> 3 </td>
<td> Murli </td>
<td> Chemistry </td>
</tr>
</table>
</body>
</html>
2. Explain the structure of the HTML webpage.
3. Why Meta tags are used in HTML?
4. How do you create links to sections within the same page?
5. What is Malware and list all Types
1. What will be the output of the following code?
</body>
</html>
The <meta> tag defines metadata about an HTML document. Metadata is data
(information) about data.
<meta> tags always go inside the <head> element, and are typically used to specify
character set, page description, keywords, author of the document, and viewport
settings.
Metadata will not be displayed on the page, but is machine passable.
Metadata is used by browsers (how to display content or reload page), search engines
(keywords), and other web services.
In CSS, "id" is a selector that may be used to designate an area that a link
should point to, similar to anchor in HTML. The nice thing about using id is
that you can create a link to any element on the page, rather than only the top
or bottom. In the following sections, you'll see how to apply id to an HTML tag,
and then how to link to it. This example will link to the opening paragraph at
the top of this page.
Result
✓ HTML links are hyperlinks, you can click on a link and jump to another
document. When you move the mouse over a link, the mouse arrow will turn
into a little hand.
Syntax
<a href="url">link text</a>
Worms
Worms replicate themselves on the system, attaching themselves to different
files and looking for pathways between computers,
Spyware
Its purpose is to steal private information from a computer system for a third
party. Spyware collects information and sends it to the hacker.
Trojan horse
A Trojan horse is malware that carries out malicious operations under the
appearance of a desired operation such as playing an online game.
Logic Bombs
A logic bomb is a malicious program that uses a trigger to activate the malicious
code. The logic bomb remains non-functioning until that trigger event happens.
Ransomware
Ransomware grasps a computer system or the data it contains until the victim
makes a payment.
Backdoors
A backdoor bypasses the usual authentication used to access a system. The
purpose of the backdoor is to grant the cyber criminals future access to the
system even if the organization fixes the original vulnerability used to attack the
system.
Rootkits
A rootkit modifies the OS to make a backdoor. Attackers then use the backdoor to
access the computer distantly. Most rootkits take advantage of software
vulnerabilities to modify system files.
Key loggers –
Records everything the user types on his/her computer system to obtain
passwords and other sensitive information and send them to the source of the
keylogging program.