Page 6 - Trackpad_ipro 4.1_Class6
P. 6

Inside The Book







                  The key features of the series have been designed to ensure better learning and assessment.



                     Learning Resources





                                               Worms
                                               A computer worm is a type of malware that can replicate itself without any human interaction. It
                                               consumes a lot of memory space in replication. Once a computer has been infected by a worm,
                                               its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
                                               worm can spread itself from one computer to another through the replication process.
                                               Trojan Horse
                                               The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
                                               Clickipedia
                   More on Spreadsheets        the software is installed on the system, the trojan activates and infects the host system.
                             Chapter            The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
                                                how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
                             06                trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.
                                                large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
                                               Spyware
                                                                          2  Select the Open option.
                     Your Aim                  Spyware is a type of malware that monitors a user's activity and sends the collected information   4  Navigate to the location where you have saved the database.
                     to learn about:           back to a hacker.  Spyware does not have any infection mechanisms  of its own.  It is  usually
                       Selecting Cells in a Worksheet
                              Copying/Moving Data  dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
                       Using Undo and Redo Features   computer and remains there silently to avoid detection.
                              Column Width and Row Height
                       Inserting Rows/Columns   Ransomware
                              Merging Cells
                       Formatting Spreadsheets                                                           Hands On
                              AutoFill
                       Using Formulas to Perform Calculation   Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
                              Order of Operation  The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
                                                                                                                   #Communication
                                                                                                                  #Art Integration
                                               refers to the money demanded to release a kidnapped hostage, similar to how ransomware
                   In the previous chapter, we learnt about different components of the Excel window, such as cell,
                                               demands payment to return access to the victim’s data.
                                               Rootkit                                                  class. system with their categories, such as internal and external. Paste some pictures of devices which
                   row, column, formula bar, workbook, and worksheet. We also learnt the process of creating a
                                                                                                         Take chart paper and make a hierarchy chart to display the hardware components of the computer
                  workbook, entering data into a worksheet, and saving a workbook. In this chapter, we will learn
                  more about MS Excel.         Rootkit is a type of malware that gains administrator access to the host system. Once the attacker   come under these categories. After completing the chart, display and explain it in front of your
                                                                          3  Click on the Browse option.
                                                                                  5  Select the   6  Click on the
                    SELECTING CELLS IN A WORKSHEET  has access to the system, the rootkit hides itself but retains special access to the system. Detection   required database.  Open button.
                                               Backdoor
                                               of a rootkit is challenging because it can bypass tracking software due to its elevated access.
                  Apart from entering data into a worksheet, Excel also provides the facility to perform various
                                                                                                                  #Digital Literacy
                                                                            If a database is like a treasure chest and you're the treasure keeper, how
                  other operations  with data,  such as modifying, inserting, moving/copying, and deleting. To
                                                                            would you organise and store your precious items to make sure you can   paste their pictures in your notebook.
                  perform all these operations, we first need to select the cell that contains the data. Excel allows
                                               Backdoor is a type of malicious software that enters the computer bundled with other software
                                               Clickipedia
                  us to select a single cell or a group of cells.   or files. It is used to gain remote access to the host computer.  find them easily when needed?  Visit your school laboratory and list the types of devices connected to the computers and
                     Single Cell: Click on the cell to select it.
                                                                           EXITING ACCESS 2019          Teacher's Corner
                     Group of Cells or Range: A  cell range is a collection of two  or more cells. It is  of two
                                               software.
                                                 ✶ Most of the malware programs are distributed over the Internet, often bundled with other
                                                                         To exit from MS Access 2019, follow the given steps:  1.  Do a walk-through of all the topics covered in this chapter.
                   types: Contiguous Cell Range and Non-Contiguous Cell Range. Contiguous Cell Range
                   is a  collection of  cells that  are  adjacent  to  or  next  to  one  another.  Colon (:) is used for
                                                 ✶ The best way to guard against malware is to install an antivirus software.
                   specifying this cell range, e.g., A1:A6. Non-contiguous Cell Range is a collection of cells that
                                                                                                       2.  Discuss with the students about all the hardware components of the computer system.
                   are not adjacent to one another. Comma (,) is used for specifying this cell range, e.g., (A1,
                   B1, C3). Click on the first cell from where you want to start the selection and drag the mouse
                                                                                                       3.  Show the components of an old CPU box and their placement on the motherboard to the students.
                                                                           1  Click on
                   diagonally up to the cell where you want to make the selection. We can also select a range of
                                                          Computer Virus  33  the File tab.
                   cells by using the Shift key. Click on the first cell and then press and hold down the Shift key,
                   and while holding the Shift key, click on the cell where you want your selection to end.
                                                                                    2  Click on the
                    Entire Row/Column: Click on the row heading to select the entire row, or click on the column
                   heading to select the entire column.                            Close option.
                    Entire Worksheet: Click on the Select All button located below the Name box to select the
                   entire worksheet. The shortcut key to select the entire worksheet is Ctrl + A.
                                             Clickipedia: This           We can also click on the Close button at the top-right corner to exit the Access window.
                                                                          Reb
                                                                            t
                  62  iPro (Ver. 4.1)-VII
                                                                              A collection of programs required to store and retrieve data from a database is called
                                                                          a Database Management System (DBMS).
                                                                            There are mainly two types of database—Flat File Database and Relational Database.
                                             section provides               Table is a group of related data organised in columns and rows in a database.
                                                                            A set of values for the fields is called a record.
                                                                            Primary key is a unique field by which the records are uniquely identified in a table.
                                           interesting computer                   Database and DBMS—An Introduction  89
                                                                                                      20
                                                                                                       iPro (Ver. 4.1)-VII
                   Your Aim: This                 facts.                 Think Tank: This
                  section describes                                     encourage students          Hands On: This
                                                                       to explore innovative      section contains an
                 the objective of the
                      chapter.                                            ideas and think          activity for Home
                                                                       beyond conventional           assignment.
                                                                              topics.
                                                    EXPLORE MORE
                                                     Latest Trends                                 How to Fill Colour in a Cell
                                                                                                   To apply fill color, follow the given steps:
                                                                                                        3  Click the arrow next to Fill Color.
                                                 BLOCKCHAIN
                                               Blockchain refers to the system of recording information which makes it difficult or impossible to change,
                                               which we record the transactions and track assets (tangible or intangible) in a business network. Tangible
                     FIREWALL                  hack, or cheat the system. Every business runs on information and blockchain is a shared ledger on   2  Click on the
                                               assets include houses, cars, cash, lands, etc. and non-tangible assets include intellectual property, patents,   Home tab.
                                               copyrights, branding, etc. It is a digital ledger of transactions that is duplicated and distributed across   colour that you
                                                                                                             4  Choose the
                    The term 'firewall' originally referred to a physical barrier designed to contain a fire or prevent
                                               the entire network of computers on the blockchain. Each block in a chain may contain the record of the
                    its spread within a building. In a computer, a firewall is a software or hardware-based network
                                               number of transactions made and the occurrence of new transactions. This record of every transaction is   #Digital Literacy  want to fill.
                    security  system  that  controls  incoming  and  outgoing  network  traffic  according  to  a  set  of
                                               updated and added to the participant’s ledger. Anything that carries value can be recorded and tracked
                    predefined rules. It acts as a gatekeeper and prevents unauthorised access to a computer network.
                                                                                                    1  Select the
                                               and can be traded on a blockchain network.  Gl    ssary  cell or range
                    A firewall examines each data packet that arrives on the network and decides whether to allow or
                    block it based on these rules. Essentially, a firewall creates a barrier between a trusted and secure
                    potentially insecure.        RPA (ROBOTIC PROCESS AUTOMATION)                   of cells.
                    internal network and an external network (such as the Internet) that is considered untrusted and
                                               Most of the jobs in any industry consist of the tasks that are
                    Reb  t                      repetitive in nature and can be automated. Robotic Process      Antivirus  software.  Tech
                                                                                                       quickly apply one of these colours, click the arrow next to Fill Color, and
                                                                               A set of programs that identify and remove malware is known as antivirus
                                                Automation  (RPA)  allows  organisations  to  automate  tasks   Microsoft Excel saves your 10 most recently selected custom colours. To
                                                which human beings were doing across any applications and   Computer Ethics  Funda
                                                systems. The purpose of RPA is to transfer the execution of   then click the colour that you want under Recent Colors.
                       A computer virus is a ‘piece of code’ or program developed to corrupt data or program
                                                                               using the computer.
                     files stored on a computer system.                        Computer Ethics are the common guidelines that we need to follow while
                                                the process from humans to robots. Robotic automation uses      Virus
                                                the existing IT structure without using any complex system   A computer virus is a ‘piece of code’ or program developed to corrupt the
                      Malware is a broad term for various types of malicious software designed to damage,
                                                                               data or program files stored on a computer system.
                    disrupt, or gain unauthorised access to a computer system.
                                                integrations. RPA can be used to automate anything. It can   Worm
                    rootkits, and backdoors.    be the workflow, infrastructure, and back office processes which are labour intensive.  A computer worm is a type of malware that has the capability to replicate   Font Color   3  Click the arrow next to Font Color.
                      The different types of malware  are  the worms, trojan  horses, spywares,  ransomware,
                                                                              itself without any human interaction.
                                                 INTERNET OF THINGS (IOT)     Cyber Crime           To apply Font color, follow the given steps:
                    your computer.                                            computers or the Internet.
                                                IoT is basically a system of interrelated computing devices, people,
                      Antivirus software is a program designed to identify, prevent, and remove malware from
                                                                              A cyber crime can be defined as criminal activities carried out by means of
                                                animals, objects, mechanical and digital machines, all of which      Database  Database implies organising the data in a manner which helps store and
                                                have a unique identifier and can transfer data over a network   retrieve a large amount of data efficiently.
                      A firewall is a software or hardware-based network security system that controls incoming
                    and outgoing network traffic according to a set of predefined rules.
                                                without any human intervention. WAs Neil Gross famously said      Firewall  A firewall is a software or hardware-based network security system that controls   2  Click on the
                                                in 1999 — “In the next century, planet earth will don an electronic
                    One  Learn                  skin. It will use the Internet as a scaffold to support and transmit     Interlinking  the incoming and outgoing network traffic based on an applied rule set.  Home tab.
                    One Touch
                                                                              The process of linking a particular section of the same web page is called
                               Section A (Objective)  its sensations”. This concept has unbelievable potential in many   interlinking.
                                                                                                                  colour that you
                   A.  Tick (3) the correct option.  businesses  and  industries.  To  check  on  SIDS  (Sudden  Infant     Intralinking  4  Select the
                                                monitor that provides parents with real-time information about their baby's breathing, skin temperature,
                                                Death  Syndrome),  the  Mimo  monitor  is  a  new  kind  of  infant   The process of linking a web page to another web page on the same   want to apply.
                      1.  Which of the following is not a type of computer virus?   body position, and activity level on their smartphones.     Port  website or another website is called intralinking.
                    a. Macro Virus
                                                                              A port is a slot on the motherboard that is used to connect other components of
                      c. Boot Sector Virus   b. E-mail Virus                  the computer, such as a keyboard, mouse, monitor, etc., to the motherboard.
                                                                                                      1  Select the
                      2.  What is another name for a program file virus?  d. Trojan Horse   144  iPro (Ver. 4.1)-VIII  Query  A query is the most powerful object in a database that helps you retrieve   cell or range
                                                                                                      of cells.
                                                                              information from a table based on some criteria or condition.
                      a. File-infecting virus                                Rootkit
                      c. Both a and b   b. File injector virus                Rootkit is a malware that gains administrator access to the host system.  70  iPro (Ver. 4.1)-VII
                              d. None of these
                      3.  What is Norton?                                  Sound Card  A sound card is a hardware device located inside the CPU box and used to
                                                                              convert the sound into digital data and vice-versa.

                    a. System Software                                       SMPS
                                              Explore More: This              Switched  Mode Power  Supply (SMPS) is a hardware  component  of the
                            b. Antivirus                                      computer used to control the power supply.
                    c. Operating System

                            d. All of these                                  Worksheet  enter data.   Tech Funda: This
                                                section provides                                       section provides
                                                                              A worksheet is the main working area in an Excel window where we can
                                                                           iPro (Ver. 4.0)-VII
                               Computer Virus                             164 164  iPro (Ver. 4.0)-VII
                                  35
                 Reboot: This section         supplement on new           Glossary: This              practical information
                 provides a summary            and trending topics       section contains                 or tips to the
                  of the chapter for          for extra knowledge.        definitions of                    students.
                 quick recapitulation.
                                                                       important IT terms.
   1   2   3   4   5   6   7   8   9   10   11