Page 6 - Trackpad_ipro 4.1_Class8
P. 6

Inside The Book







                  The key features of the series have been designed to ensure better learning and assessment.



                     Learning Resources





                                                Worms
                                                A computer worm is a type of malware that can replicate itself without any human interaction. It
                                                consumes a lot of memory space in replication. Once a computer has been infected by a worm,
                                                its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
                                               Trojan Horse
                                               worm can spread itself from one computer to another through the replication process.
                                               The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
                   More on Spreadsheets        Clickipedia
                                               the software is installed on the system, the trojan activates and infects the host system.
                             Chapter            The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
                                                how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
                             06                 trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.
                                                large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
                                               Spyware                     2  Select the Open option.
                     Your Aim                  Spyware is a type of malware that monitors a user's activity and sends the collected information   4  Navigate to the location where you have saved the database.
                     to learn about:           back to a hacker.  Spyware does not have any infection mechanisms  of its own.  It is  usually
                       Selecting Cells in a Worksheet   dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
                              Copying/Moving Data
                       Using Undo and Redo Features   computer and remains there silently to avoid detection.
                              Column Width and Row Height  Ransomware
                       Inserting Rows/Columns
                              Merging Cells
                       Formatting Spreadsheets                                                           Hands On
                              AutoFill
                       Using Formulas to Perform Calculation   Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
                              Order of Operation  The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
                                                                                                                   #Communication
                                               refers to the money demanded to release a kidnapped hostage, similar to how ransomware
                                                                                                                   #Art Integration
                                               Rootkit                                                  class. Take chart paper and make a hierarchy chart to display the hardware components of the computer
                                               demands payment to return access to the victim’s data.
                   In the previous chapter, we learnt about different components of the Excel window, such as cell,
                   row, column, formula bar, workbook, and worksheet. We also learnt the process of creating a
                   workbook, entering data into a worksheet, and saving a workbook. In this chapter, we will learn
                   more about MS Excel.        Rootkit is a type of malware that gains administrator access to the host system. Once the attacker   come under these categories. After completing the chart, display and explain it in front of your
                                                                                                         system with their categories, such as internal and external. Paste some pictures of devices which
                                                                          3  Click on the Browse option.  5  Select the   6  Click on the
                                                                                  required database.
                    SELECTING CELLS IN A WORKSHEET  of a rootkit is challenging because it can bypass tracking software due to its elevated access.  Open button.
                                               has access to the system, the rootkit hides itself but retains special access to the system. Detection
                                               Backdoor
                   Apart from entering data into a worksheet, Excel also provides the facility to perform various
                                                                             If a database is like a treasure chest and you're the treasure keeper, how   #Digital Literacy
                   other operations  with data,  such as modifying, inserting, moving/copying, and deleting. To
                                               Backdoor is a type of malicious software that enters the computer bundled with other software
                                                                             would you organise and store your precious items to make sure you can   paste their pictures in your notebook.
                  perform all these operations, we first need to select the cell that contains the data. Excel allows
                                               Clickipedia
                  us to select a single cell or a group of cells.   or files. It is used to gain remote access to the host computer.  find them easily when needed?  Visit your school laboratory and list the types of devices connected to the computers and
                     Single Cell: Click on the cell to select it.                                       Teacher's Corner
                                                                           EXITING ACCESS 2019
                     Group of Cells or Range: A  cell range is a collection of two  or more cells. It is  of two
                                               software.
                                                                         To exit from MS Access 2019, follow the given steps:  3.  Show the components of an old CPU box and their placement on the motherboard to the students.
                                                 ✶ Most of the malware programs are distributed over the Internet, often bundled with other
                   types: Contiguous Cell Range and Non-Contiguous Cell Range. Contiguous Cell Range
                                                                                                        1.  Do a walk-through of all the topics covered in this chapter.
                   is a  collection of  cells that  are  adjacent  to  or  next  to  one  another.  Colon (:) is used for
                                                 ✶ The best way to guard against malware is to install an antivirus software.
                   specifying this cell range, e.g., A1:A6. Non-contiguous Cell Range is a collection of cells that
                                                                                                        2.  Discuss with the students about all the hardware components of the computer system.
                   are not adjacent to one another. Comma (,) is used for specifying this cell range, e.g., (A1,
                   B1, C3). Click on the first cell from where you want to start the selection and drag the mouse
                   diagonally up to the cell where you want to make the selection. We can also select a range of
                                                                           1  Click on
                                                           Computer Virus  33
                                                                           the File tab.
                   cells by using the Shift key. Click on the first cell and then press and hold down the Shift key,
                   and while holding the Shift key, click on the cell where you want your selection to end.
                                                                                    2  Click on the
                     Entire Row/Column: Click on the row heading to select the entire row, or click on the column
                   heading to select the entire column.
                                                                                   Close option.
                     Entire Worksheet: Click on the Select All button located below the Name box to select the
                                                                         We can also click on the Close button at the top-right corner to exit the Access window.
                   entire worksheet. The shortcut key to select the entire worksheet is Ctrl + A.
                                             Clickipedia: This            Reb  t
                  62
                    iPro (Ver. 4.1)-VII
                                                                              A collection of programs required to store and retrieve data from a database is called
                                                                          a Database Management System (DBMS).
                                                                            There are mainly two types of database—Flat File Database and Relational Database.
                                             section provides               Table is a group of related data organised in columns and rows in a database.
                                                                            A set of values for the fields is called a record.
                                                                            Primary key is a unique field by which the records are uniquely identified in a table.
                                           interesting computer                    Database and DBMS—An Introduction  89
                                                                                                      20  iPro (Ver. 4.1)-VII
                   Your Aim: This                 facts.                 Think Tank: This
                  section describes                                     encourage students          Hands On: This
                 the objective of the                                  to explore innovative      section contains an
                       chapter.                                           ideas and think          activity for Home
                                                                       beyond conventional           assignment.
                                                                              topics.
                                                    EXPLORE MORE
                                                                                                   To apply fill color, follow the given steps:
                                                     Latest Trends                                 How to Fill Colour in a Cell
                                                                                                        3  Click the arrow next to Fill Color.
                                                 BLOCKCHAIN
                                               Blockchain refers to the system of recording information which makes it difficult or impossible to change,
                                               which we record the transactions and track assets (tangible or intangible) in a business network. Tangible   2  Click on the
                      FIREWALL                 hack, or cheat the system. Every business runs on information and blockchain is a shared ledger on
                                               assets include houses, cars, cash, lands, etc. and non-tangible assets include intellectual property, patents,   Home tab.  4  Choose the
                                               copyrights, branding, etc. It is a digital ledger of transactions that is duplicated and distributed across
                    The term 'firewall' originally referred to a physical barrier designed to contain a fire or prevent
                                               the entire network of computers on the blockchain. Each block in a chain may contain the record of the   #Digital Literacy  colour that you
                                                                                                             want to fill.
                    its spread within a building. In a computer, a firewall is a software or hardware-based network
                                               number of transactions made and the occurrence of new transactions. This record of every transaction is
                                               updated and added to the participant’s ledger. Anything that carries value can be recorded and tracked   1  Select the
                    security  system  that  controls  incoming  and  outgoing  network  traffic  according  to  a  set  of
                    predefined rules. It acts as a gatekeeper and prevents unauthorised access to a computer network.
                                                and can be traded on a blockchain network.  Gl    ssary  cell or range
                    A firewall examines each data packet that arrives on the network and decides whether to allow or
                    block it based on these rules. Essentially, a firewall creates a barrier between a trusted and secure
                                                                                                    of cells.
                                                 RPA (ROBOTIC PROCESS AUTOMATION)
                    internal network and an external network (such as the Internet) that is considered untrusted and
                    potentially insecure.
                                                Most of the jobs in any industry consist of the tasks that are
                    Reb  t                      repetitive in nature and can be automated. Robotic Process      Antivirus  A set of programs that identify and remove malware is known as antivirus
                                                Automation  (RPA)  allows  organisations  to  automate  tasks   Tech  Microsoft Excel saves your 10 most recently selected custom colours. To
                                                                               software.
                                                which human beings were doing across any applications and   Computer Ethics  Computer Ethics are the common guidelines that we need to follow while   Funda  quickly apply one of these colours, click the arrow next to Fill Color, and
                                                systems. The purpose of RPA is to transfer the execution of   then click the colour that you want under Recent Colors.
                       A computer virus is a ‘piece of code’ or program developed to corrupt data or program
                     files stored on a computer system.                        using the computer.
                                                the process from humans to robots. Robotic automation uses      Virus  A computer virus is a ‘piece of code’ or program developed to corrupt the
                                                the existing IT structure without using any complex system   data or program files stored on a computer system.
                      Malware is a broad term for various types of malicious software designed to damage,
                                                integrations. RPA can be used to automate anything. It can
                     disrupt, or gain unauthorised access to a computer system.
                      The different types of malware  are  the worms, trojan  horses, spywares,  ransomware,
                    rootkits, and backdoors.    be the workflow, infrastructure, and back office processes which are labour intensive.  Worm  A computer worm is a type of malware that has the capability to replicate   Font Color   3  Click the arrow next to Font Color.
                                                                               itself without any human interaction.
                    your computer.               INTERNET OF THINGS (IOT)     Cyber Crime  A cyber crime can be defined as criminal activities carried out by means of   To apply Font color, follow the given steps:
                      Antivirus software is a program designed to identify, prevent, and remove malware from
                                                IoT is basically a system of interrelated computing devices, people,   computers or the Internet.
                                                animals, objects, mechanical and digital machines, all of which      Database
                                                have a unique identifier and can transfer data over a network   Database implies organising the data in a manner which helps store and
                      A firewall is a software or hardware-based network security system that controls incoming
                                                                              retrieve a large amount of data efficiently.
                    and outgoing network traffic according to a set of predefined rules.
                                                without any human intervention. WAs Neil Gross famously said      Firewall  A firewall is a software or hardware-based network security system that controls   2  Click on the
                                                skin. It will use the Internet as a scaffold to support and transmit
                    One Touch
                    One  Learn                  in 1999 — “In the next century, planet earth will don an electronic     Interlinking  the incoming and outgoing network traffic based on an applied rule set.  Home tab.
                                                                              interlinking.
                               Section A (Objective)  its sensations”. This concept has unbelievable potential in many   The process of linking a particular section of the same web page is called
                   A.  Tick (3) the correct option.  businesses  and  industries.  To  check  on  SIDS  (Sudden  Infant   4  Select the
                                                                                                                  want to apply.
                      1.  Which of the following is not a type of computer virus?   Death  Syndrome),  the  Mimo  monitor  is  a  new  kind  of  infant     Intralinking  The process of linking a web page to another web page on the same   colour that you
                                                monitor that provides parents with real-time information about their baby's breathing, skin temperature,
                                                                              website or another website is called intralinking.
                      a. Macro Virus            body position, and activity level on their smartphones.     Port
                              b. E-mail Virus                                 A port is a slot on the motherboard that is used to connect other components of
                    c. Boot Sector Virus                                      the computer, such as a keyboard, mouse, monitor, etc., to the motherboard.
                              d. Trojan Horse                                                         1  Select the
                                                144  iPro (Ver. 4.1)-VIII    Query  A query is the most powerful object in a database that helps you retrieve   cell or range
                      2.  What is another name for a program file virus?      information from a table based on some criteria or condition.  of cells.
                    a. File-infecting virus                                  Rootkit

                      c. Both a and b   b. File injector virus                Rootkit is a malware that gains administrator access to the host system.  iPro (Ver. 4.1)-VII
                                                                                                      70
                            d. None of these                                 Sound Card  A sound card is a hardware device located inside the CPU box and used to
                    3.  What is Norton?                                       convert the sound into digital data and vice-versa.
                      a. System Software      Explore More: This             SMPS
                                                                              Switched  Mode Power  Supply (SMPS) is a hardware  component  of the
                      c. Operating System   b. Antivirus                      computer used to control the power supply.
                              d. All of these
                                                                            Worksheet  enter data.     Tech Funda: This
                                                                              A worksheet is the main working area in an Excel window where we can
                                                                           iPro (Ver. 4.0)-VII
                               Computer Virus  35  section provides       164 164  iPro (Ver. 4.0)-VII
                                               supplement on new          Glossary: This              practical information
                 Reboot: This section                                                                  section provides
                 provides a summary            and trending topics       section contains                 or tips to the
                  of the chapter for          for extra knowledge.        definitions of                    students.
                 quick recapitulation.
                                                                       important IT terms.
   1   2   3   4   5   6   7   8   9   10   11