Page 6 - Trackpad_ipro 4.1_Class8
P. 6
Inside The Book
The key features of the series have been designed to ensure better learning and assessment.
Learning Resources
Worms
A computer worm is a type of malware that can replicate itself without any human interaction. It
consumes a lot of memory space in replication. Once a computer has been infected by a worm,
its processing speed slows down, it works unexpectedly, and halts other tasks. A computer
Trojan Horse
worm can spread itself from one computer to another through the replication process.
The purpose of a trojan horse is to conceal itself inside a software that seems legitimate. When
More on Spreadsheets Clickipedia
the software is installed on the system, the trojan activates and infects the host system.
Chapter The term ‘trojan’ is derived from the Trojan Horse story in Greek mythology, which explains
how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a
06 trusted the gift blindly. In the night, the soldiers emerged and attacked the city from within.
large wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and
Spyware 2 Select the Open option.
Your Aim Spyware is a type of malware that monitors a user's activity and sends the collected information 4 Navigate to the location where you have saved the database.
to learn about: back to a hacker. Spyware does not have any infection mechanisms of its own. It is usually
Selecting Cells in a Worksheet dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s
Copying/Moving Data
Using Undo and Redo Features computer and remains there silently to avoid detection.
Column Width and Row Height Ransomware
Inserting Rows/Columns
Merging Cells
Formatting Spreadsheets Hands On
AutoFill
Using Formulas to Perform Calculation Ransomware is malicious software that locks or encrypts the victim’s data, making it inaccessible.
Order of Operation The attacker then demands a large sum of money to unlock or decrypt the data. The term 'ransom'
#Communication
refers to the money demanded to release a kidnapped hostage, similar to how ransomware
#Art Integration
Rootkit class. Take chart paper and make a hierarchy chart to display the hardware components of the computer
demands payment to return access to the victim’s data.
In the previous chapter, we learnt about different components of the Excel window, such as cell,
row, column, formula bar, workbook, and worksheet. We also learnt the process of creating a
workbook, entering data into a worksheet, and saving a workbook. In this chapter, we will learn
more about MS Excel. Rootkit is a type of malware that gains administrator access to the host system. Once the attacker come under these categories. After completing the chart, display and explain it in front of your
system with their categories, such as internal and external. Paste some pictures of devices which
3 Click on the Browse option. 5 Select the 6 Click on the
required database.
SELECTING CELLS IN A WORKSHEET of a rootkit is challenging because it can bypass tracking software due to its elevated access. Open button.
has access to the system, the rootkit hides itself but retains special access to the system. Detection
Backdoor
Apart from entering data into a worksheet, Excel also provides the facility to perform various
If a database is like a treasure chest and you're the treasure keeper, how #Digital Literacy
other operations with data, such as modifying, inserting, moving/copying, and deleting. To
Backdoor is a type of malicious software that enters the computer bundled with other software
would you organise and store your precious items to make sure you can paste their pictures in your notebook.
perform all these operations, we first need to select the cell that contains the data. Excel allows
Clickipedia
us to select a single cell or a group of cells. or files. It is used to gain remote access to the host computer. find them easily when needed? Visit your school laboratory and list the types of devices connected to the computers and
Single Cell: Click on the cell to select it. Teacher's Corner
EXITING ACCESS 2019
Group of Cells or Range: A cell range is a collection of two or more cells. It is of two
software.
To exit from MS Access 2019, follow the given steps: 3. Show the components of an old CPU box and their placement on the motherboard to the students.
✶ Most of the malware programs are distributed over the Internet, often bundled with other
types: Contiguous Cell Range and Non-Contiguous Cell Range. Contiguous Cell Range
1. Do a walk-through of all the topics covered in this chapter.
is a collection of cells that are adjacent to or next to one another. Colon (:) is used for
✶ The best way to guard against malware is to install an antivirus software.
specifying this cell range, e.g., A1:A6. Non-contiguous Cell Range is a collection of cells that
2. Discuss with the students about all the hardware components of the computer system.
are not adjacent to one another. Comma (,) is used for specifying this cell range, e.g., (A1,
B1, C3). Click on the first cell from where you want to start the selection and drag the mouse
diagonally up to the cell where you want to make the selection. We can also select a range of
1 Click on
Computer Virus 33
the File tab.
cells by using the Shift key. Click on the first cell and then press and hold down the Shift key,
and while holding the Shift key, click on the cell where you want your selection to end.
2 Click on the
Entire Row/Column: Click on the row heading to select the entire row, or click on the column
heading to select the entire column.
Close option.
Entire Worksheet: Click on the Select All button located below the Name box to select the
We can also click on the Close button at the top-right corner to exit the Access window.
entire worksheet. The shortcut key to select the entire worksheet is Ctrl + A.
Clickipedia: This Reb t
62
iPro (Ver. 4.1)-VII
A collection of programs required to store and retrieve data from a database is called
a Database Management System (DBMS).
There are mainly two types of database—Flat File Database and Relational Database.
section provides Table is a group of related data organised in columns and rows in a database.
A set of values for the fields is called a record.
Primary key is a unique field by which the records are uniquely identified in a table.
interesting computer Database and DBMS—An Introduction 89
20 iPro (Ver. 4.1)-VII
Your Aim: This facts. Think Tank: This
section describes encourage students Hands On: This
the objective of the to explore innovative section contains an
chapter. ideas and think activity for Home
beyond conventional assignment.
topics.
EXPLORE MORE
To apply fill color, follow the given steps:
Latest Trends How to Fill Colour in a Cell
3 Click the arrow next to Fill Color.
BLOCKCHAIN
Blockchain refers to the system of recording information which makes it difficult or impossible to change,
which we record the transactions and track assets (tangible or intangible) in a business network. Tangible 2 Click on the
FIREWALL hack, or cheat the system. Every business runs on information and blockchain is a shared ledger on
assets include houses, cars, cash, lands, etc. and non-tangible assets include intellectual property, patents, Home tab. 4 Choose the
copyrights, branding, etc. It is a digital ledger of transactions that is duplicated and distributed across
The term 'firewall' originally referred to a physical barrier designed to contain a fire or prevent
the entire network of computers on the blockchain. Each block in a chain may contain the record of the #Digital Literacy colour that you
want to fill.
its spread within a building. In a computer, a firewall is a software or hardware-based network
number of transactions made and the occurrence of new transactions. This record of every transaction is
updated and added to the participant’s ledger. Anything that carries value can be recorded and tracked 1 Select the
security system that controls incoming and outgoing network traffic according to a set of
predefined rules. It acts as a gatekeeper and prevents unauthorised access to a computer network.
and can be traded on a blockchain network. Gl ssary cell or range
A firewall examines each data packet that arrives on the network and decides whether to allow or
block it based on these rules. Essentially, a firewall creates a barrier between a trusted and secure
of cells.
RPA (ROBOTIC PROCESS AUTOMATION)
internal network and an external network (such as the Internet) that is considered untrusted and
potentially insecure.
Most of the jobs in any industry consist of the tasks that are
Reb t repetitive in nature and can be automated. Robotic Process Antivirus A set of programs that identify and remove malware is known as antivirus
Automation (RPA) allows organisations to automate tasks Tech Microsoft Excel saves your 10 most recently selected custom colours. To
software.
which human beings were doing across any applications and Computer Ethics Computer Ethics are the common guidelines that we need to follow while Funda quickly apply one of these colours, click the arrow next to Fill Color, and
systems. The purpose of RPA is to transfer the execution of then click the colour that you want under Recent Colors.
A computer virus is a ‘piece of code’ or program developed to corrupt data or program
files stored on a computer system. using the computer.
the process from humans to robots. Robotic automation uses Virus A computer virus is a ‘piece of code’ or program developed to corrupt the
the existing IT structure without using any complex system data or program files stored on a computer system.
Malware is a broad term for various types of malicious software designed to damage,
integrations. RPA can be used to automate anything. It can
disrupt, or gain unauthorised access to a computer system.
The different types of malware are the worms, trojan horses, spywares, ransomware,
rootkits, and backdoors. be the workflow, infrastructure, and back office processes which are labour intensive. Worm A computer worm is a type of malware that has the capability to replicate Font Color 3 Click the arrow next to Font Color.
itself without any human interaction.
your computer. INTERNET OF THINGS (IOT) Cyber Crime A cyber crime can be defined as criminal activities carried out by means of To apply Font color, follow the given steps:
Antivirus software is a program designed to identify, prevent, and remove malware from
IoT is basically a system of interrelated computing devices, people, computers or the Internet.
animals, objects, mechanical and digital machines, all of which Database
have a unique identifier and can transfer data over a network Database implies organising the data in a manner which helps store and
A firewall is a software or hardware-based network security system that controls incoming
retrieve a large amount of data efficiently.
and outgoing network traffic according to a set of predefined rules.
without any human intervention. WAs Neil Gross famously said Firewall A firewall is a software or hardware-based network security system that controls 2 Click on the
skin. It will use the Internet as a scaffold to support and transmit
One Touch
One Learn in 1999 — “In the next century, planet earth will don an electronic Interlinking the incoming and outgoing network traffic based on an applied rule set. Home tab.
interlinking.
Section A (Objective) its sensations”. This concept has unbelievable potential in many The process of linking a particular section of the same web page is called
A. Tick (3) the correct option. businesses and industries. To check on SIDS (Sudden Infant 4 Select the
want to apply.
1. Which of the following is not a type of computer virus? Death Syndrome), the Mimo monitor is a new kind of infant Intralinking The process of linking a web page to another web page on the same colour that you
monitor that provides parents with real-time information about their baby's breathing, skin temperature,
website or another website is called intralinking.
a. Macro Virus body position, and activity level on their smartphones. Port
b. E-mail Virus A port is a slot on the motherboard that is used to connect other components of
c. Boot Sector Virus the computer, such as a keyboard, mouse, monitor, etc., to the motherboard.
d. Trojan Horse 1 Select the
144 iPro (Ver. 4.1)-VIII Query A query is the most powerful object in a database that helps you retrieve cell or range
2. What is another name for a program file virus? information from a table based on some criteria or condition. of cells.
a. File-infecting virus Rootkit
c. Both a and b b. File injector virus Rootkit is a malware that gains administrator access to the host system. iPro (Ver. 4.1)-VII
70
d. None of these Sound Card A sound card is a hardware device located inside the CPU box and used to
3. What is Norton? convert the sound into digital data and vice-versa.
a. System Software Explore More: This SMPS
Switched Mode Power Supply (SMPS) is a hardware component of the
c. Operating System b. Antivirus computer used to control the power supply.
d. All of these
Worksheet enter data. Tech Funda: This
A worksheet is the main working area in an Excel window where we can
iPro (Ver. 4.0)-VII
Computer Virus 35 section provides 164 164 iPro (Ver. 4.0)-VII
supplement on new Glossary: This practical information
Reboot: This section section provides
provides a summary and trending topics section contains or tips to the
of the chapter for for extra knowledge. definitions of students.
quick recapitulation.
important IT terms.

