Thursday, February 1, 2024

class 6

 What is computer virus?

A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer. Viruses are harmful and can destroy data, slow down system resources, and log keystrokes.

Windows, Mac, Android, and iOS

Many computer viruses target systems running Microsoft Windows. Macs, on the other hand, have enjoyed a reputation as virus-proof super machines, but in Apple’s own admission, Macs do get malware. There are more Windows users in the world than Mac users and cybercriminals simply choose to write viruses for the operating system (OS) with the largest amount of potential victims. 

Today, the “computer” in our pockets may be the one we use most often: our smartphones. Android and iOS are susceptible to various forms of malware, too. Fortunately, most cybersecurity companies like Malwarebytes offer protection for Windows, Mac, Android, and iOS today. 

Computer virus examples

Sometimes to understand what something is, we have to examine what it isn’t. Keeping that in mind, let’s play: Is It a Virus?

In the Is It a Virus game we’re going to take a look at examples of things people on the Internet commonly believe to be a virus and explain why it is or isn’t. What fun!

Is a Trojan a virus? Trojans can be viruses. A Trojan is a computer program pretending to be something it’s not for the purposes of sneaking onto your computer and delivering some sort of malware. 

History of computer viruses

Today’s malware authors owe a lot to the cybercriminals of yesteryear. All the tactics and techniques employed by cybercriminals creating modern malware were first seen in early viruses. Things like Trojans, ransomware, and polymorphic code. These all came from early computer viruses. To understand the threat landscape of today, we need to peer back through time and look at the viruses of yesteryear.

1984, Computer virus, defined
In 1984 computer scientist Fred Cohen handed in his graduate thesis paper, Computer Viruses – Theory and Experiments in which he coined the term “computer virus,” which is great because “complicated self-reproducing automata” is a real mouthful. In the same paper, Cohen also gave us our first definition of “computer virus” as “a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.”

1999, “You’ve got mail (and also a virus)”
Think back to 1999. If someone you knew sent you an email that read “Here is the document you requested … don’t show anyone else ;-),” you opened the attachment.

This was how the Melissa virus spread and it played on the public’s naivetΓ© about how viruses worked up to that point. Melissa was a macro virus. Viruses of this type hide within the macro language commonly used in Microsoft Office files. Opening up a viral Word doc, Excel spreadsheet, etc. triggers the virus.

How Does the Internet Work? 

An internet is a huge network of networks that helps us to connect millions of computers together. These computers that are connected to each other through the internet can interact with each other over the internet.

The Internet operates on a technique called packet switching. In packet switching, the data that is transferred among the different computers on the internet are transmitted in the form of packets. These packets contain information about the error control mechanisms, the address of the destination, and also the sequence in which the packets are to be transmitted.

What happens when we surf the Internet?

1. Extracting IP address of a URL (Uniform Resource Locator) In our browser, we enter the URL (Uniform Resource Locator) address of the website we want to visit. Once we enter the URL address of the website, the browser with the help of the DNS (Domain Name System) extracts the IP address corresponding to the URL address that is entered. The DNS (Domain Name System) contains the mapping of the URLs along with their corresponding IP addresses.

dns

2. Sending request to the server to access the webpage and receiving response Once we get the IP address of the website we want to access using DNS, the browser sends an HTTP (Hypertext Transfer Protocol) request to the server to extract the HTM (Hypertext Markup Language)L webpage corresponding to the IP address. This request is sent over PORT 80 using TCP (Transmission Control Protocol). Once the server receives this HTTP request, it responds back with an HTTP response. This HTTP response consists of the information related to the HTML page corresponding to the IP address of the website.

thanks for visite to this Website guys✌πŸ‘‡πŸ‘‡πŸ˜‰πŸ‘ ....................

πŸ‘‡πŸ‘‡πŸ™πŸ™  please support to my social media accounts


Facebookfacebook
Instagramdaviputin786
YouTubeyoutube
                                       ☝☝☝☝πŸ‘πŸ‘πŸ˜‡





class 8

 What is the Internet?

The Internet is a global network of billions of computers and other electronic devices. With the Internet, it's possible to access almost any information, communicate with anyone else in the world, and do much more.

You can do all of this by connecting a computer to the Internet, which is also called going onlineWhen someone says a computer is online, it's just another way of saying it's connected to the Internet.

Computers wirelessly connecting to the Internet

What is the Web?

The World Wide Web—usually called the Web for short—is a collection of different websites you can access through the Internet. A website is made up of related text, images, and other resources. Websites can resemble other forms of media—like newspaper articles or television programs—or they can be interactive in a way that's unique to computers.

Social networking

Social networking websites are another way to connect and share with your family and friends online. Rather than sharing with just a few people over email, social networks make it easier to connect and share with many people at the same time. Facebook is the world's largest social networking site, with more than 1 billion users worldwide.

Chat and instant messaging

Chat and instant messaging (IM) are short messages sent and read in real time, allowing you to converse more quickly and easily than email. These are generally used when both (or all) people are online, so your message can be read immediately. By comparison, emails won't be seen until recipients check their inboxes.

Screenshot of chat

Examples of instant messaging applications include Yahoo Messenger and Google Hangouts. Some sites, like Gmail and Facebook, even allow you to chat within your web browser.

Online media

There are many sites that allow you to watch videos and listen to music. For example, you can watch millions of videos on YouTube or listen to Internet radio on Pandora. Other services, like Netflix and Hulu, allow you to watch movies and TV shows. And if have a set-top streaming box, you can even watch them directly on your television instead of a computer screen.

Basics of Computer Networking


Computer Networking is the practice of connecting computers together to enable communication and data exchange between them. In general, Computer Network is a collection of two or more computers. It helps users to communicate more easily. In this article, we are going to discuss the basics which everyone must know before going deep into Computer Networking.

Basic Terminologies of Computer Networks

  • Network: A network is a collection of computers and devices that are connected together to enable communication and data exchange.
  • Nodes: Nodes are devices that are connected to a network. These can include computers, Servers, Printers, Routers, Switches, and other devices.
  • Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a network. Examples of protocols include TCP/IPHTTP, and FTP.
  • Topology: Network topology refers to the physical and logical arrangement of nodes on a network. The common network topologies include bus, star, ring, mesh, and tree.
  • Service Provider Networks: These types of Networks give permission to take Network Capacity and Functionality on lease from the Provider. Service Provider Networks include Wireless Communications, Data Carriers, etc.
  • IP Address: An IP address is a unique numerical identifier that is assigned to every device on a network. IP addresses are used to identify devices and enable communication between them.
  • DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names (such as www.google.com) into IP addresses that computers can understand.
  • Firewall: firewall is a security device that is used to monitor and control incoming and outgoing network traffic. Firewalls are used to protect networks from unauthorized access and other security threats.

What is Visual Basic?

Visual Basic is a third-generation event-driven programming language first released by Microsoft in 1991. It evolved from the earlier DOS version called BASIC. BASIC means Beginners' All-purpose Symbolic Instruction Code. Since then Microsoft has released many versions of Visual Basic, from Visual Basic 1.0 to the final version Visual Basic 6.0. Visual Basic is a user-friendly programming language designed for beginners, and it enables anyone to develop GUI window applications easily.


The Visual Basic 6 Integrated Development Environment

Before you can write programs in VB 6, you need to install Visual Basic 6 compiler on your computer. You can purchase a copy of Microsoft Visual Basic 6.0 Learning Edition or Microsoft Visual Basic Professional Edition from Amazon.com, both are vb6 compilers. Besides, you can also buy it from eBay at Microsoft Visual Basic 6.0 6 Professional PRO MSDN Library Manual Service Pack. If you have already installed Microsoft Office in your PC or laptop, you can also use the built-in Visual Basic Application in Excel to start creating Visual Basic programs without having to spend extra cash to buy the VB6 compiler.

thanks for visite to this Website guys✌πŸ‘‡πŸ‘‡πŸ˜‰πŸ‘ ....................

πŸ‘‡πŸ‘‡πŸ™πŸ™  please support to my social media accounts


Facebookfacebook
Instagramdaviputin786
YouTubeyoutube
                                       ☝☝☝☝πŸ‘πŸ‘πŸ˜‡

class 7


What is flashes logo?
Allen was a scientist who gains his power after being struck by lightning, which granted him superspeed. He named himself The Flash after his hero Jay Garrick, with his emblem being a lightning bolt in the center of his red costume.
What does Flash symbol mean?
The official colors were: a white lightning bolt ("flash") and circle, a blue roundel, and a red background. The symbolism of this design was meant to convey a flash of action within a circle of unity.
Introduction:- 
Electronic mail, commonly known as email, is a method of exchanging messages over the internet. Here are the basics of email:
  1. An email address: This is a unique identifier for each user, typically in the format of name@domain.com.
  1. An email client: This is a software program used to send, receive and manage emails, such as Gmail, Outlook, or Apple Mail.
  1. An email server: This is a computer system responsible for storing and forwarding emails to their intended recipients.
           To send an email:
  1. Enter the recipient’s email address in the “To” field.
  2. Add a subject line to summarize the content of the message.
  3. Write the body of the message.
  4. Attach any relevant files if needed.
  5. Click “Send” to deliver the message to the recipient’s email server.
  6. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send copies of the message to multiple recipients, and reply, reply all, and forward options to manage the conversation.
Advantages of email:
  • Convenient and fast communication with individuals or groups globally.
  • Easy to store and search for past messages.
  • Ability to send and receive attachments such as documents, images, and videos.
  • Cost-effective compared to traditional mail and fax.
  • Available 24/7.
  • Risk of spam and phishing attacks.
  • Overwhelming amount of emails can lead to information overload.
  • Can lead to decreased face-to-face communication and loss of personal touch.
  • Potential for miscommunication due to lack of tone and body language in written messages.
  • Technical issues, such as server outages, can disrupt email service.
  • It is important to use email responsibly and effectively, for example, by keeping the subject line clear and concise, using proper etiquette, and protecting against security threats.
What is QBasic Class 7 short note?
QBasic is an integrated development environment (IDE) and interpreter for a variety of dialects of BASIC which are based on QuickBASIC. Code entered into the IDE is compiled to an intermediate representation (IR), and this IR is immediately executed on demand within the IDE.

Write any four features of QBASIC.

Ans: Four features of QBASIC are:

QBASIC has many features. Some features of QBASIC are given below.

QBASIC is interpreter based language, so it is easy to debug.

QBASIC checks syntax automatically

QBASIC supports various inbuilt functions.

QBASIC supports modular programming approach.

QBASIC is not case sensitive so, can be used in any case of letters.






















πŸ‘‡πŸ‘‡πŸ™πŸ™  please support to my social media accounts


Facebookfacebook
Instagramdaviputin786
YouTubeyoutube
                                       ☝☝☝☝πŸ‘πŸ‘πŸ˜‡

Thursday, November 9, 2023

class 6

 INTRODUCTION OF MS EXCEL 

What is MS Excel  :- 

Microsoft Excel is a software application designed for creating tables to input and organize data. It provides a user-friendly way to analyze and work with data. The image below provides a visual representation of what an Excel spreadsheet typically appears like

Screenshot-(256)

Excel Interface

Excel-HomeWhat is a Cell

A spreadsheet takes the shape of a table, consisting of rows and columns. A cell is created at the intersection point where rows and columns meet, forming a rectangular box. 

What is Cell Address or Cell Reference

The address or name of a cell or a range of cells is known as Cell reference. It helps the software to identify the cell from where the data/value is to be used in the formula. We can reference the cell of other worksheets and also of other programs.

  • Referencing the cell of other worksheets is known as External referencing.
  • Referencing the cell of other programs is known as Remote referencing.

There are three types of cell references in Excel:  

  1. Relative reference.
  2. Absolute reference.
  3. Mixed reference.

Features of MS Excel

Ribbon

Th eRibbon in MS-Excel is the topmost row of tabs that provide the user with different facilities/functionalities. These tabs are:

MS Excel is a commonly used Microsoft Office application. It is a spreadsheet program which is used to save and analyse numerical data.

In this article, we bring to you the important features of MS Excel, along with an overview of how to use the program, its benefits and other important elements. A few sample MS Excel question and answers are also given further below in this article for the reference of Government exam aspirants. 

To learn more about the other programs under Microsoft Office, visit the linked article.

Computer Awareness is an integral part of the syllabus for major competitive exams and questions from MS Excel may also be asked in these exams. To get the detailed syllabus for Computer Knowledge, candidates can visit the linked article. 

Basics of MS Excel

What is MS Excel?

MS Excel is a spreadsheet program where one can record data in the form of tables. It is easy to analyse data in an Excel spreadsheet. The image given below represents how an Excel spreadsheet looks like:

MS Excel Spreadsheet

How to open MS Excel?

To open MS Excel on your computer, follow the steps given below:

  • Click on Start
  • Then All Programs
  • Next step is to click on MS Office
  • Then finally, choose the MS-Excel option

Alternatively, you can also click on the Start button and type MS Excel in the search option available.

What is a cell?

A spreadsheet is in the form of a table comprising rows and columns. The rectangular box at the intersection point between rows and columns forms a cell. Given below is an image of a cell:

What is a Cell in MS Excel

What is Cell Address?

The cell address is the name by which is cell can be addressed. For example, if row 7 is interested in column G, then the cell address is G7. 

Features of MS Excel

Various editing and formatting can be done on an Excel spreadsheet. Discussed below are the various features of MS Excel. 

The image below shows the composition of features in MS Excel:

Features of MS Excel

  • Home
    • Comprises options like font size, font styles, font colour, background colour, alignment, formatting options and styles, insertion and deletion of cells and editing options
  • Insert
    • Comprises options like table format and style, inserting images and figures, adding graphs, charts and sparklines, header and footer option, equation and symbols
  • Page Layout
    • Themes, orientation and page setup options are available under the page layout option
  • Formulas
    • Since tables with a large amount of data can be created in MS excel, under this feature, you can add formulas to your table and get quicker solutions 
  • Data
    • Adding external data (from the web), filtering options and data tools are available under this category
  • Review
    • Proofreading can be done for an excel sheet (like spell check) in the review category and a reader can add comments in this part 
  • View
    • Different views in which we want the spreadsheet to be displayed can be edited here. Options to zoom in and out and pane arrangement are available under this category

For those willing to learn more about MS Excel, can refer to the video given below and understand every small aspect of this program in detail.

Intro of QBASIC :- 

QBasic is an integrated development environment (IDE) and interpreter for a variety of dialects of BASIC which are based on QuickBASIC. Code entered into the IDE is compiled to an intermediate representation (IR), and this IR is immediately executed on demand within the IDE.

History[edit]

QBasic was intended as a replacement for GW-BASIC. It was based on the earlier QuickBASIC 4.5 compiler but without QuickBASIC's compiler and linker elements. Version 1.0 was shipped together with MS-DOS 5.0 and higher, as well as Windows 95Windows NT 3.x, and Windows NT 4.0IBM recompiled QBasic and included it in PC DOS 5.x, as well as OS/2 2.0 onwards.[5] eComStation and ArcaOS, descended from OS/2 code, include QBasic 1.0. QBasic 1.1 is included with MS-DOS 6.x, and, without EDIT, in Windows 95Windows 98 and Windows Me. Starting with Windows 2000, Microsoft no longer includes QBasic with their operating systems.


thanks for visite to this Website guys✌πŸ‘‡πŸ‘‡πŸ˜‰πŸ‘ ....................

πŸ‘‡πŸ‘‡πŸ™πŸ™  please support to my social media accounts


Facebookfacebook
Instagramdaviputin786
YouTubeyoutube
                                       ☝☝☝☝πŸ‘πŸ‘πŸ˜‡

class 6

  What is computer virus? A computer virus is a type of malware that attaches to another program (like a document), which can replicate and ...