Page 360 - Computer Science Class 11 Without Functions
P. 360
Let's Summarise
Ø A digital footprint is a trail of personal data that one leaves behind while using the Internet.
Ø The information you leave willingly is known as an active digital footprint.
Ø The information that companies collect without your knowledge or approval is known as a passive digital
footprint.
Ø Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
(such as a password or private files) or damage the system or network.
Ø When someone steals your personal information to commit fraud, it is known as identity theft.
Ø Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source,
like a bank or a government agency.
Ø Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
Ø Trolls are comments or posts that insult or defame other users or their content.
Ø When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
Ø Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
Ø A Denial of Service, or DOS, attack renders a machine or network resource unavailable either temporarily or
permanently to its intended users.
Ø Malware is a program that aims to harm a computer, server, client, or computer network.
Ø A virus is a piece of software code that can damage your system by replacing or messing up the system
files.
Ø The boot sector virus is a virus that affects the boot sector of disks. It gets activated when the drive is started
(booted up).
Ø File infectors are viruses that attach themselves to executable files by overwriting a part of their code or
appending their code to the files.
Ø Macroviruses embed themselves in documents. A macro refers to specific instructions within an application.
Ø Macroviruses are executable files that may be received as email attachments.
Ø A Trojan horse is malware that presents itself as a desirable and helpful program but actually causes harm to
the system.
Ø A worm is a malicious program that replicates itself. So, a networked device could have several copies of a
worm infecting many files.
Ø Spyware secretly collects information from a system.
Ø Adware is software that displays advertisements to users of the Internet and mobile applications.
Ø Ransomware is a type of malicious software that holds data or devices hostage for a ransom.
Ø In incognito or private browsing mode, the browser does not store your browsing history or cookies.
Ø When you visit a website, it may store small pieces of text called cookies so that it can keep track of the users’
preferences and provide the users with a more satisfying experience.
Ø A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a
network.
Ø While entering any sensitive personal information on a website, look for HTTPS in the address bar to make
sure your data is encrypted.
358 Touchpad Computer Science-XI

