Dear Friends, please like this page, plzzzzzzzzzzzzz 1).Meaning - TopicsExpress



          

Dear Friends, please like this page, plzzzzzzzzzzzzz 1).Meaning of DOMAIN : domain is an area of control or a sphere of knowledge, where it consists of a set of network addresses. Domain contains a group of computers that can be accessed and administered with a common set of rules. The advantages and disadvantages of WWW are: Advantages: 1.You can find lots of information 2.You can purchase things online 3.You can watch things or listen to things 4.You can play games 5.You can check your account 6.You can find files 7.You can find friends 8.You can do lots of things. Disadvantages: 1. Danger of overload and excess information 2. It requires an efficient information search strategy 3. Search can be slow 4. It is difficult to filter and priorities information 5. No guarantee of finding what one id looking for 6. There is lot of apparently connected information 7. No regulation 8. Can cause problem of referencing. 2) B TYPES OF COMPUTER CRIMES: Computer crime involves the unauthorized use of computer technology to manipulate the critical user data. It are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. The following are the computer crimes: a) Hacking: the activity of breaking into computer system to gain unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on computer system is called hacking. b) Phishing: phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit cards details by disguising as a trustworthy source. It is carried out through emails or by luring the users to enter personal information through fake websites that have a look and feel of some popular website which makes the users feel safe to enter their details there. c) Cyber stalking: The use of communication technology, mainly the internet, to torture other individuals is known as cyber stalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyber stalking activities. d) Identity theft: this is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of false identity. It is act of pretending to be someone else by using someone else’s identity as one’s own. e) Software privacy: the theft of software through the illegal copying of genuine software or programs and distribution of products intended to pass for the original retail revenue losses world wide are ever increasing due to this crime. f) IRC crime: internet relay chat servers have chat rooms in which people from anywhere the world can come together and chat with each other, criminals use it for meeting conspirators. Hackers use it discussing their exploits or sharing the techniques. d) Differences between the virus, worms and Trojan. Virus A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email. Worm A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receivers address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. Trojan horse A Trojan horse is full of as much trickery as the mythological Trojan buthorse it was named after. The Trojan horse, at first glance will appear to be useful will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a back door on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. C) E-COMMERCE: Electronic commerce, commonly known as e- commerce or e Commerce, is a type of industry where the buying and selling of products or services is conducted over electronic systems such as the Internet and other computer networks. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI),inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the world wide webt least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices social media, and telephones as well. Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. This is an effective and efficient way of communicating within an organization and one of the most effective and useful ways of conducting business. E-commerce can be divided into: • E-tailing or virtual storefronts on websites with online catalogs, sometimes gathered into a virtual mall • Buying or Selling on various websites and/or online marketplaces • The gathering and use of demographic data through Web contacts and social media • Electronic Data Interchange (EDI), the business-to- business exchange of data • E-mail and fax and their use as media for reaching prospective and established customers (for example, with newsletters) • buying and selling • The security of business transactions.
Posted on: Sun, 20 Oct 2013 08:26:42 +0000

Trending Topics



Recently Viewed Topics




© 2015