Page 6 - Trackpad_ipro 4.1_Class7
P. 6
Inside The Book
The key features of the series have been designed to ensure better learning and assessment.
Learning Resources
Worms
A computer worm is a type of malware that can replicate itself without any human interaction. It
consumes a lot of memory space in replication. Once a computer has been infected by a worm,
its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
worm can spread itself from one computer to another through the replication process.
Trojan Horse
The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
Clickipedia
More on Spreadsheets the software is installed on the system, the trojan activates and infects the host system.
Chapter The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
06 trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.
large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
Spyware
2 Select the Open option.
Your Aim Spyware is a type of malware that monitors a user's activity and sends the collected information 4 Navigate to the location where you have saved the database.
to learn about: back to a hacker. Spyware does not have any infection mechanisms of its own. It is usually
Selecting Cells in a Worksheet
Copying/Moving Data dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
Using Undo and Redo Features computer and remains there silently to avoid detection.
Column Width and Row Height
Inserting Rows/Columns Ransomware
Merging Cells
Formatting Spreadsheets Hands On
AutoFill
Using Formulas to Perform Calculation Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
Order of Operation The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
#Communication
#Art Integration
refers to the money demanded to release a kidnapped hostage, similar to how ransomware
In the previous chapter, we learnt about different components of the Excel window, such as cell,
demands payment to return access to the victim’s data.
Rootkit class. system with their categories, such as internal and external. Paste some pictures of devices which
row, column, formula bar, workbook, and worksheet. We also learnt the process of creating a
Take chart paper and make a hierarchy chart to display the hardware components of the computer
workbook, entering data into a worksheet, and saving a workbook. In this chapter, we will learn
more about MS Excel. Rootkit is a type of malware that gains administrator access to the host system. Once the attacker come under these categories. After completing the chart, display and explain it in front of your
3 Click on the Browse option.
5 Select the 6 Click on the
SELECTING CELLS IN A WORKSHEET has access to the system, the rootkit hides itself but retains special access to the system. Detection required database. Open button.
Backdoor
of a rootkit is challenging because it can bypass tracking software due to its elevated access.
Apart from entering data into a worksheet, Excel also provides the facility to perform various
#Digital Literacy
If a database is like a treasure chest and you're the treasure keeper, how
other operations with data, such as modifying, inserting, moving/copying, and deleting. To
would you organise and store your precious items to make sure you can paste their pictures in your notebook.
perform all these operations, we first need to select the cell that contains the data. Excel allows
Backdoor is a type of malicious software that enters the computer bundled with other software
Clickipedia
us to select a single cell or a group of cells. or files. It is used to gain remote access to the host computer. find them easily when needed? Visit your school laboratory and list the types of devices connected to the computers and
Single Cell: Click on the cell to select it.
EXITING ACCESS 2019 Teacher's Corner
Group of Cells or Range: A cell range is a collection of two or more cells. It is of two
software.
✶ Most of the malware programs are distributed over the Internet, often bundled with other
To exit from MS Access 2019, follow the given steps: 1. Do a walk-through of all the topics covered in this chapter.
types: Contiguous Cell Range and Non-Contiguous Cell Range. Contiguous Cell Range
is a collection of cells that are adjacent to or next to one another. Colon (:) is used for
✶ The best way to guard against malware is to install an antivirus software.
specifying this cell range, e.g., A1:A6. Non-contiguous Cell Range is a collection of cells that
2. Discuss with the students about all the hardware components of the computer system.
are not adjacent to one another. Comma (,) is used for specifying this cell range, e.g., (A1,
B1, C3). Click on the first cell from where you want to start the selection and drag the mouse
3. Show the components of an old CPU box and their placement on the motherboard to the students.
1 Click on
diagonally up to the cell where you want to make the selection. We can also select a range of
Computer Virus 33 the File tab.
cells by using the Shift key. Click on the first cell and then press and hold down the Shift key,
and while holding the Shift key, click on the cell where you want your selection to end.
2 Click on the
Entire Row/Column: Click on the row heading to select the entire row, or click on the column
heading to select the entire column. Close option.
Entire Worksheet: Click on the Select All button located below the Name box to select the
entire worksheet. The shortcut key to select the entire worksheet is Ctrl + A.
Clickipedia: This We can also click on the Close button at the top-right corner to exit the Access window.
Reb
t
62 iPro (Ver. 4.1)-VII
A collection of programs required to store and retrieve data from a database is called
a Database Management System (DBMS).
There are mainly two types of database—Flat File Database and Relational Database.
section provides Table is a group of related data organised in columns and rows in a database.
A set of values for the fields is called a record.
Primary key is a unique field by which the records are uniquely identified in a table.
interesting computer Database and DBMS—An Introduction 89
20
iPro (Ver. 4.1)-VII
Your Aim: This facts. Think Tank: This
section describes encourage students Hands On: This
to explore innovative section contains an
the objective of the
chapter. ideas and think activity for Home
beyond conventional assignment.
topics.
EXPLORE MORE
Latest Trends How to Fill Colour in a Cell
To apply fill color, follow the given steps:
3 Click the arrow next to Fill Color.
BLOCKCHAIN
Blockchain refers to the system of recording information which makes it difficult or impossible to change,
which we record the transactions and track assets (tangible or intangible) in a business network. Tangible
FIREWALL hack, or cheat the system. Every business runs on information and blockchain is a shared ledger on 2 Click on the
assets include houses, cars, cash, lands, etc. and non-tangible assets include intellectual property, patents, Home tab.
copyrights, branding, etc. It is a digital ledger of transactions that is duplicated and distributed across colour that you
4 Choose the
The term 'firewall' originally referred to a physical barrier designed to contain a fire or prevent
the entire network of computers on the blockchain. Each block in a chain may contain the record of the
its spread within a building. In a computer, a firewall is a software or hardware-based network
number of transactions made and the occurrence of new transactions. This record of every transaction is #Digital Literacy want to fill.
security system that controls incoming and outgoing network traffic according to a set of
updated and added to the participant’s ledger. Anything that carries value can be recorded and tracked
predefined rules. It acts as a gatekeeper and prevents unauthorised access to a computer network.
1 Select the
and can be traded on a blockchain network. Gl ssary cell or range
A firewall examines each data packet that arrives on the network and decides whether to allow or
block it based on these rules. Essentially, a firewall creates a barrier between a trusted and secure
potentially insecure. RPA (ROBOTIC PROCESS AUTOMATION) of cells.
internal network and an external network (such as the Internet) that is considered untrusted and
Most of the jobs in any industry consist of the tasks that are
Reb t repetitive in nature and can be automated. Robotic Process Antivirus software. Tech
quickly apply one of these colours, click the arrow next to Fill Color, and
A set of programs that identify and remove malware is known as antivirus
Automation (RPA) allows organisations to automate tasks Microsoft Excel saves your 10 most recently selected custom colours. To
which human beings were doing across any applications and Computer Ethics Funda
systems. The purpose of RPA is to transfer the execution of then click the colour that you want under Recent Colors.
A computer virus is a ‘piece of code’ or program developed to corrupt data or program
using the computer.
files stored on a computer system. Computer Ethics are the common guidelines that we need to follow while
the process from humans to robots. Robotic automation uses Virus
the existing IT structure without using any complex system A computer virus is a ‘piece of code’ or program developed to corrupt the
Malware is a broad term for various types of malicious software designed to damage,
data or program files stored on a computer system.
disrupt, or gain unauthorised access to a computer system.
integrations. RPA can be used to automate anything. It can Worm
rootkits, and backdoors. be the workflow, infrastructure, and back office processes which are labour intensive. A computer worm is a type of malware that has the capability to replicate Font Color 3 Click the arrow next to Font Color.
The different types of malware are the worms, trojan horses, spywares, ransomware,
itself without any human interaction.
INTERNET OF THINGS (IOT) Cyber Crime To apply Font color, follow the given steps:
your computer. computers or the Internet.
IoT is basically a system of interrelated computing devices, people,
Antivirus software is a program designed to identify, prevent, and remove malware from
A cyber crime can be defined as criminal activities carried out by means of
animals, objects, mechanical and digital machines, all of which Database Database implies organising the data in a manner which helps store and
have a unique identifier and can transfer data over a network retrieve a large amount of data efficiently.
A firewall is a software or hardware-based network security system that controls incoming
and outgoing network traffic according to a set of predefined rules.
without any human intervention. WAs Neil Gross famously said Firewall A firewall is a software or hardware-based network security system that controls 2 Click on the
in 1999 — “In the next century, planet earth will don an electronic
One Learn skin. It will use the Internet as a scaffold to support and transmit Interlinking the incoming and outgoing network traffic based on an applied rule set. Home tab.
One Touch
The process of linking a particular section of the same web page is called
Section A (Objective) its sensations”. This concept has unbelievable potential in many interlinking.
colour that you
A. Tick (3) the correct option. businesses and industries. To check on SIDS (Sudden Infant Intralinking 4 Select the
monitor that provides parents with real-time information about their baby's breathing, skin temperature,
Death Syndrome), the Mimo monitor is a new kind of infant The process of linking a web page to another web page on the same want to apply.
1. Which of the following is not a type of computer virus? body position, and activity level on their smartphones. Port website or another website is called intralinking.
a. Macro Virus
A port is a slot on the motherboard that is used to connect other components of
c. Boot Sector Virus b. E-mail Virus the computer, such as a keyboard, mouse, monitor, etc., to the motherboard.
1 Select the
2. What is another name for a program file virus? d. Trojan Horse 144 iPro (Ver. 4.1)-VIII Query A query is the most powerful object in a database that helps you retrieve cell or range
of cells.
information from a table based on some criteria or condition.
a. File-infecting virus Rootkit
c. Both a and b b. File injector virus Rootkit is a malware that gains administrator access to the host system. 70 iPro (Ver. 4.1)-VII
d. None of these
3. What is Norton? Sound Card A sound card is a hardware device located inside the CPU box and used to
convert the sound into digital data and vice-versa.
a. System Software SMPS
Explore More: This Switched Mode Power Supply (SMPS) is a hardware component of the
b. Antivirus computer used to control the power supply.
c. Operating System
d. All of these Worksheet enter data. Tech Funda: This
section provides section provides
A worksheet is the main working area in an Excel window where we can
iPro (Ver. 4.0)-VII
Computer Virus 164 164 iPro (Ver. 4.0)-VII
35
Reboot: This section supplement on new Glossary: This practical information
provides a summary and trending topics section contains or tips to the
of the chapter for for extra knowledge. definitions of students.
quick recapitulation.
important IT terms.

