Page 85 - ModularV1.1 _c7_flipbook
P. 85

Carding: This refers to the process of stealing credit card numbers online, to be resold or
                    used to charge merchandise against victim’s account.
                     HACKING AND CRACKING

                 Hacking is  the unauthorised access to computer system  for the purpose of destroying the
                 system or stealing important information from the system. Hackers are people who break into
                 the other’s computer system to steal important data or to destroy it. In general computer terms,
                 we call them as white hats, black hats and grey hats.

                 Hackers,  who  are  out  to  steal  personal  information,  change  an  organisation’s  financial  data,
                 break security codes to gain unauthorised network access, or conduct other destructive activities
                 are sometimes called “crackers.”
                 Software cracking is considered illegal and cracked software is often called pirated software.
                 A cracker get into all kinds of mischief, including breaking or “cracking” copy protection on
                 software programs, breaking into systems and causing harm, changing data, or stealing.


                    Recap



                         Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
                         The technique of seeing the person while talking to him is called video conferencing.
                          Online chat refers  to  a  communication in the form  of small messages among  the
                        computers over the Internet, just like SMS service on mobiles.
                         The most common and popular VoIP services used in India are Skype and GoogleTalk.
                          Blogs are generally a detailed explanation on a subject or sometimes also as a Diary
                        of Events.
                          Cloud storage is a service where the users are able to store and manage data on
                        remote server in place of their local computer.
                          The process of protecting computer resources such as networks, devices, programs,
                        and data from unauthorised access, damage, or attack is called cyber security.
                         Cyber crime is a criminal activity in which computers are used to do the crime.




                                                        Exercise



                 A.  Tick ( ) the correct option.
                    1.  Which of the following is not a cloud storage?

                      a. Google Drive                      b. Pen Drive                  c. Dropbox

                    2.  What is the technique of seeing the person while talking to him is called?
                      a. Video conferencing                b. E-mail                     c. Blog

                    3.  Which of these is not a communication service of the Internet?

                      a. Chat                              b. Blog                       c. E-mail


                                                                                             Services on Internet  83
   80   81   82   83   84   85   86   87   88   89   90