You are on page 1of 26
Pg Doubt Clearing Session Complete Course on Paper 1 Vednala Shivalingam + Lesson 14 + June 19, 2021 Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram grou ‘It is a Global system of inter-|| « It is a Private Network specific| |. t is @ Private network that connected computer network. || to an organization. uses public network to share ‘© Not regulated by any authority.}|* It is regulated by an! formation with suppliers. + Thus, contentin the network is]| organization. ‘+ Regulated by multiple org. accessible to _everyone}|« Thus, contentin the networkis]|. Content in the network is connected. accessible only to members of| | accessible to members of org. * Itislargestintermsofnumber}| organization. & external member with of connected devices. ‘+ Small network with minimum} | excess to network. * Itis owned by no one. number of connected devices. ||» The no. of device connected is elt means sharing _of| * Owned by single organization. comparable with Intranet. information throughout the|| ¢ Means of sharing information] |» security enforced via Firewall world. throughout organization. that separates Internet and Security is dependent on the||* Security is enforced vial| Extranet. user of device connected, “Firewall”. ‘* Users should have valid! © Users can access Internet||* Users should have valid]! _username/ password to use. anonymously. username/ password touse. |{e Extranet is used by Internet is unregulated and|| Intranet is regulated by|| contractual agreement. uncensored. organizational policies. between organizations. hat we are normally using] | « Eg: TCS using Intranet. « Eg: HP & Intel using network. DEA e akc eee A eT Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: EiMtmtrr nti mea) TYPES J PUBLIC ) PRIVATE PRIVATE ) Information sharing }{ Information sharing }{ Information sharing Eee) | rec soce | Earp ose’, POSSESSION By None By single Organization By single/multiple ‘ Organization ) ACCESSABILITY _Accessaniuiry | Anyone “Siant/Employes esa ees) DATASECURED Not Secured ; Secured f Secured ) {_nerworkarea_} Large JL ‘Small ‘Small ) Network Diagram Ishiva Vodnala, M.com (F.A)} Computers in a network have to be connected in some logical manner. The layout pattern of the| interconnections between computers in a network is called network topology. You can think o topology as the virtual shape or structure of the network. Network topology is also referred to as} ‘network architecture. TYPES OF COMPUTER NETWORK T 7 T T De Bus Star Ring Mesh Tree Topology Topology ‘Topology Topology Topology Point-to-Point Topology Point-to-point topology is the simplest of all the network topologies. The: network consists of a direct link between two computers. This is faster and| more reliable than other types of connections since there is a direct] connection. The disadvantage is that it can only be used for small areas) where computers are in close proximity. aH Point-to-Point Dee |) TSSET, PGDBF | Cee oe Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in eee 's Telegram group: Sire nner ee) Bus topology uses one main cable to which all nodes are directl) connected. The main cable acts as a backbone for the network. One of the i computers in the network typically acts as the computer server. The first] Network advantage of bus topology is that it is easy fo connect a computer or] Backbone peripheral device. The second advantage is that the cable requirements are relatively small, resulting in lower cost. a RO In star topology, each computer is connected to a central hub using af point-to-point connection, The central hub can be a computer server that} manages the network, or it can be a much simpler device that only makes) the connections between computers over the network possible. Star} topology is very popular because the startup costs are low. ta In ring topology, the computers in the network are connected in a circular} fashion, and the data travels in one direction. Each computer is directly connected to the next computer, forming a single pathway for signals) through the network. This type of network is easy to install and manage. DEV e ace ae ee aA or 1s Telegram group: Hiri eens Follow me on ‘= ‘ond Use “SHIVAVODNALA” for 10% OFF | Join in * Computers in mesh topology are connected directly to every other devi with cables. * Creates point to point connection to every device on network. If one cable fails data has always alternative path to get to its destination. © This type of topology generally used in military area. sea # It has a root node and all other nodes are connected to it forming hierarchy. + It is also called hierarchical topology. It should at least have three levels to the hierarchy. * Integrates the characteristics of “Star” and “Bus” topology. In Tree Topology number of networks connected using Bus. The backbone cable is called as “Bus”. [Shiva Vodnala, M.com (F.A), NET JRF Commerce, NET Mgmt, (I D.) TSSET, PGDBF | TEL Follow me on —_ and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram gro ; _— File extensions are a way of labelling the names of files so you and your computer can keep track of what they contain, ... The last part of the file name is used to indicate the type of file so the computer| can open the correct program when you want to use the file. TYPES OF MAIN FILE EXTENSION: Audio File Image File Microsoft Other file Extensions Extensions Word, Extensions © MP3. movi + .AVI- Audio Video| Ng} |e .PNG- portable} | » .docx- bet Interleave picure expert] | networkgraphies| | document, FSiemeres | 2 MPG oF PEC] | Tee indo] |* BMP or bitmap] |» doc. a ora moving picture) a image file. icrosoft wor fe expert group. pa © Jpegimagefile. |e .xlsx- excel + sFLA- Adobe fash] |* MIDE musical) | Gir. graphical] | workbook. arene instr, i file. ite asl eae image format. s pptx. Power] | “rr: text files -FLV- Adobe flash] | | ieriace ek «© bak-backup files. video. eee Presentation esa | interchange file Slopes ictgiesea - wel ¢ .WAV- waveform| browser file. Bean point SlideShare, [Shiva Vodnale, M.com (F.A), NET JRF Commerco, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to Soe your Name with JRF] A browser isa software application for accessing information on WWW. In contrast, a search engine is a software system that is designed to search for information on| WWW. This is the main difference between browser and search engine. Chrome, Firefox, Internet Explorer and Safari are some examples for browsers| oe ae Google, Bing, Yahoo and Ask.com are some examples of search engi Another difference between browser and search engine is that a browser is locally installed] ‘onthe user’s device whilea search engineis.a software system that runs on WWW, ‘The first web browser, World Wide Web (WWW), was developed in 1990 British computer scientist! Tim Berners-Lee CONCLUSION: There is a distinct difference between browser and search engine although some people use these two words interchangeably. The main difference between browser and search engine is that] SE eC EA ees ee Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: =a CC a G Q — ding degpite ave dle fi | webBrowser | | webBrowser | ‘pio © @ Mesilla Fiefon Tmernet Explorer Microsoft Edge Doge a eC Follow me on Unacademy and Use “SHIVAVODNALA” for 107% OFF | Join in 's Telegram group: Simran ea) ‘Computer malware are type of software programme. It isa malicious program able to inject its code into other programs or applications or data files and targeted areas become “infected”. RISKWARE__ | Boot Sector Virus | SPOOFING | _Logic Bombs j ee | Multipartite Virus] spamming | Dea Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in TC UT 1 a shivavodnalavacnetirf is a cyber-attack intended to redirect a website's traffic to another, fake site, Pharming can be conducted either by changing the hostsfile on a victim's computer or by exploitation of a vulnerability in DNS server software. is a cybercrime in which a target or targets are contacted by email, telephone or text, message by someone posing as a legitimate institution te trap individuals into Sredit card details, and passwords are legitimate programs that can cause damage to computer program, Malicious entities can take advantage of the weaknesses of programs to delete, copy, block, or| modify data in machine. | sroorin | can be used to gain access toa target's personal information, spread malware through| infected links or attachments. enable hackers to sted including e-mail messages, company files, and confidential reports. is the use of messaging systems to send an unsolicited message, especially! advertising, as well as sending messages repeatedly on the same site. Ishiva Vodnala, M.com (F.A), NET JRF Commerce, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to See your Name with JRF] Follow me on Unacademy and Use “SHIVAVODNALA" for 10% OFF | Join in Plus Telegram group: Eiitrirr arin en) hackers flood a network or Web Server with many thousands of false communications| or requests for services to crash the networks, The network receives so many] queries that it cannot keep up with them and is thus unavailable to service legitimate requests, are the most common method of tracking users across multiple websites, Third- party tracking cookies store data about visited websites to log the user's browsing history over along period of time. presents unwanted advertisements to the user of a computer, The advertisements| produced by adware are sometimes in the form of a pop-up or sometimes in an is a form of criminal phone fraud, using social engineering over the telephone system to gain access to private personal and financial informa reward. is i is i Such as cracking) a password or a public WIFI network in order to see people private information. n for the purpose of financial DEI e ace CA erry Tr Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in 's Telegram group: Sitrirr nner ae) is also known as whaling phishing or a whaling phishing attack, It is a specific type| of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company. Nia aie):.@m| is a process of capturing the data packets travelling in the network, It can be used| nid by IT Professionals to analysis and monitor the traffic. A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. ‘WORM stands for (Write Once Read Many). A computer worm is a type of malware| roy that spreads copies of itself from computer to computer. A worm can replicate itself] without any human interaction, and it does not need to attach itself to a software program in order to cause damage. Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. DEI eae ec aA erry Tr Follow me on Unacademy and Use for 10% OFF | Plus Telegram group: SP nn + Trgeta muti peopieat compe + Ragas arte may / oe, (Sckotaweteo cede rent Biers Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Sitrirr nnn ea) ‘are a malicious programming code that is inserted into a network system or a single computer} for the purpose of deleting data or creating other maliciousacts ona specified date. A logic bomb works similar to a time bomb because it can be set to go off at a specific date. a isa harmful, destructive or intrusive type of malware that can change or“morph_makingit Sr epi Wane ge Sst ily a a ea ea describe the first viruses that included DOS executable files and PC BIOS boot sector virus} code, where both parts are viral themselves. FE] is a computer virus that infects and spreads in multiple ways, The term was coined to isa computer virus written in the same macro language used for software programs, including) BERSNOMEM| Microsoft Excel or word processors such as Microsoft Word. When a macro virus infects a STIR | software application, jt causes a sequence of actions to begin automatically when the! application is opened. adware, along with other forms of malicious programs. IShiva Vodnalo, M.com (F.A), NET JRF Commerce, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to See your Name with JRF] Follow me on Unacademy and Use “SHIVAVODNALA" for 10% OFF | =——= The Evolution of the ———= TRE OH — @CHTTP OURL World Wide Web Oey ee oe the eee a World Wide Web and the esdeson thew Internet are the same? a pa st inp Hereis the difference. a Itall started in 1946 ‘Thefistthingresembling | Hedeseribed | WorldWide Webappeared | how every In fition home hada «Murray Veinstr described | Loge that computerstkedeviowsas| accessed “Logis ina short story _ | acentral deviceto retrieve information TERNET — storrmtineccteseommctont ‘communicate with eachother globally WORLD WIDE WEB === Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eiitrimrnrintr ra) DEE eA eT Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telearam aroun: STitrtrrnrietr rer) Joined fees witha st Robert Calin And eewrotethe erga! et The real vision and execution: happened in the 1980s working na projet called uirewasjastadatabaee of | propleandvotwarewho | ‘workedatthesame paceastee | By 1080,Tim dated Management: Proposal hat sharedhisvsion ofthe Word | Wide Web ‘Tim developed the thre ajo components af theweb Heer TMLand webbrowser Einetscape hivavodnalavacneticf] Follow me on “1093 ‘and Use 0 i ia for 10% OFF | Join in Plus Telegram group: World Wide Web becomes mainstream attraction Enter savScrpt and CSS Ikbecame an oficial {aio tothe Word Wie Web ay ChaCha carer ttn ber Callan became avira trend ana spreadvia email Hedectbad tar hemos habe loge - (aseftwarerkardnare configuration that whe inelegant infin hms, of Patched together suceeds in solving specific problem ot performing paricalrtaik In thebistory ofcomputing ie pent er hain erations Peep-to- Peer fe sharing bt Seva ped the fora became popular wth ee eae oe aes raked lost| Sonilion users —- rented = pers eG) ane | ee ar in cme Vodnala, M.com (F.A), NET JRF Commerce, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to See your Name with JRF] Neate Aresearch projectin 1906 was fr Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Telegram aroun: Dot Com 2000-2005 - Googe -stlla starupatthetime revives 25 millon guy funding — Investors threw money nay ger as lurched tea emt the asalosingpltforn ‘operational by March 00 cave vwet 2000 Aes toes jooye launched AdWords ‘Goodie Ads) to compete with 2000 Mt loteretEsplore was Coomet anche thefist eb browser Recor ies awit against, nt ad sacks tosupport (SStspecfation peda was anced iy SR eee ken ee COA ee Follow me on Unacademw and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eitri art mya) © 2001-2005 Social Media websites fw emeraton soc networing IShiva Vodnala, M.com (F.A), NET JRF Commerce, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to See your Name with JRF] Follow me on Unacademy and Use “SHIVAVODNALA" for 10% OFF | Join in Plus Telegram group: imme nner ea) . +2007 Serrminmmmnin fj revolutionized motile web taaneviome farted =. 8 demographics Ls Inatagram fall =a 2008 mane at = apo oe wnyasd a Tome 00 appsinitially Thefirstversion of Google Android 0S was released Ishiva Vodnala, M.com (F.A), NET JRF Commerco, NET Mgmt, (Ph.D.) TSSET, PGDBF | Waiting to See your Name with JRF] Android Market (now Play Store) was hunched Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eiitrimrnrintr ra) DEE eA eT Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eiitrimrnrintr ra) DEE eA eT Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eiitrimrnrintr ra) DEE eA eT Follow me on Unacademy and Use “SHIVAVODNALA” for 10% OFF | Join in Plus Telegram group: Eiitrimrnrintr ra) DEE eA eT

You might also like