SlideShare a Scribd company logo
KENDRIYA VIDYALAYA
NO- 1 SAGAR (CANTT.)
SUBJECT- COMPUTER
POWER POINT PRESENTATION

SUBMITTED TO MR. V. NEMA
INTERNET
INTROUCTION TO INTERNET
The internet is a network consisting of
thousands of small and large compute
networks. In other words internet can be
defined as a global network where
million of computers are connected to
each other.
All computers connected on the
net can exchange information by
following certain rules called Protocols.
Therefore a protocol is a set of rules
which the computers use to
communicate with one another across a
network.
SERVICIES POVIDED BY INTERNET
1- World Wide Web (www)
2- E-Mail (Electronic mail)

3- News group
4- Chat
5- Bulleting Board Service
6- Video Conferencing
7- File Transfer Protocol (FTP)
8- E-Commerce
9- Telnet
10- Hyper Text Transfer Protocol (HTTP)
Components required to connect to
Internet

1- A Computer System
2- A Modem
3- An Internet Service Provider (ISP)
connection
4- An Internet browsing software.
Modem
A modem is a computer device to connect
to and communicate with other computes
via a telephone line. Modem convents
digital signals to analog symbols, which is
known as Modulation and also converts the
analog signals to digital signals, known as
Demodulation. Hence the word Modem
comes from Modulator and Demodulator.

THERE ARE TWO TYPE OF MODEMS
AVAILABLE :1- Internal Modem
2- External Modem.
INTERNET SERVICE PROVIDER (ISP)
Internet Service Provides are companies
that provide the Internet connection against
charging some fee. ISPs use powerful
computes called Savers with high storage
capacity and memory, which is connected
with other savers through satellites all over
the world. The ISPs gives an account
number an password to its user to gain
access to the Internet.
When we want to use the internet,
you dial an get connected to an ISP. The
ISP then handles al the communication
between us and the Internet.
ISP IN INIDA
SOME OF THE ISPS IN INIDA ARE:-

• VSNL
• MTML
• Manta On-Line
• Satyam On-Line
WEB BOWSER
It is a software, which allows the user to
access and browse information on the
internet. Without a web browser internet
cannot be accessed. Internet Explorer,
Netscape Navigator, Opera an Mosaic are
common examples of web browses.
WEBSITE
A website is a collection of web pages which
give information about an organization, a
topic etc. A website can contain many
Hypertext links which link to a piece of text
or graphic that is like to some other text,
graphic, page or file.
TYPES OF WEBSITES :1- .com for Commercial Purposes like
Rediffmail.com
2- .org for Organizations like Congress.org
3- .edu for Educational Purposes like
imt.edu
4- .gov for Government like
inianraiways.gov.in
UNIFORM RESOURCE LOCATOR (URL)

URL provides an address to locate any site
on the Internet. Every website has got a
distinct URL. With the help of the URL, the
web site is retrieved by the Web Browser.
The URL helps the user to identify and
locate any resource on the Internet.
Search engines
Search Engine is a software that helps us to
locate Web Pages on the Internet that
contain information on the specified topics.
We can search for any topic, images, news,
video, meaning etc. using the search
engines.
SOME POPULAR SEARCH ENGINES
ARE:1- http.//google.com
2- http//khoj.com
3- http//yahoo.com
4- http// indiatimes.com

5- http//altavista.com
6- http// lycos.com etc.
Computer virus
COMPUTER VIRUS
A computer virus is a program intentionally
designed by a programmer for destroying
system files and data of other computers. A
virus program duplicates itself without any
instruction from the user and damages the
data on our disk by corrupting programs, or
even formatting the entire hard disk. In other
words we can say that virus simply
replicates. Virus corrupts or damages the
data without the knowledge of the user at a
very great speed.
How does virus infect a computer
system
Computer virus spread with the great speed
from one computer to another by means of
infected disks, networks, programs
downloaded from the Internet etc. a floppy
disk can also infect a computer. Some virus
programs are so well designed that they
have a pre-set date or time on which they
automatically. Virus can infect the display of
a file or keyboard or any program files as
word processor, database etc.
HOW DOES VIRUS SPREAD
Virus can easily spread from one system to
another by copying any infected application
on starting the computer system. This is
because the virus goes into the memory of
the computer and starts infecting each
application that gets executed by us. The
virus programs get transferred into a
computer through other virus infected
programs, which we copy from floppies,
CDs etc. examples of such viruses are
Michealangelo, Monkey etc.
Different types of virus:Boot virus
This type of virus infects the startup area of
the hard disk o floppy disk. They attach
themselves with the boot area and overwrite
on the original instructions and take up
control of the system. Booting means
stating the computer and loading the
operating system.
EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
PROGRAM VIRUS
This type of virus infect application
programs such as word processor,
database etc. When the infected fie is
executed, the virus gets activated and
remains present in the main memory
even when the execution of the file is
over. When you execute another fie,
the virus attaches itself to the new fie
and thus another file gets infected.
EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle
etc.
SYSTEM VIRUS

These viruses attach themselves to the
operating system and infect the input/output
unit of the operating system. They always
stay in the memory, damage parts of the
operating system and then destroy
themselves.
TROJAN HORSES AND WORMS

Trojan horses programs are those programs
that are useful to perform certain tasks. But
at the same time they damage files or data
in the system. This program destroys
Effects of virus
1- Viruses generally affect the software, files and folders of a
computer. Hardware components are generally immune to
viruses.
2- Fie with .exe extensions are soft targets to viruses.

3- Viruses can infect boot records thereby causing booting
problems.
4- Other effects of viruses include corruption of data files,
periodic hang- ups, slow system performance, loss of data
etc.
5- Viruses can also alter the contents and the size of a file.
6- It can change the al the files names to a signal name.
7- It can erase programs or data.
8- It can overwrite entire directories.
9- It can create bad sectors in files and therefore destroy
parts of the files
PRECAUTIONS
WE SHOULD
1- Scan all floppies using antivirus software.

2- Write protect the floppies before coping
data from other computer system.
3- Keep backup of all data and files.
4- Prepare an emergency boot disk.

5- Update your Antivirus program
periodically.
6- Restrict the use of your computer system
so that there is no unauthorized use.
We should not

1- Use floppies without scanning them
for possible viruses.
2- Run an unknown program without
using an antivirus to detect any viruses.
3- Allow everyone to use your computer
system.

4- While using Internet do not download
anything from the Internet without
scanning for viruses.
ANTIVIRUS SOFTWaRE
Antivirus is a software designed to
detect and remove viruses from the
computer system. Some types of virus
are difficult to remove. Antivirus program
gets activated whenever the computer
system is booted up.
IT DETECTES THE VIRUS AND
REMOVES IT. ANTIVIRUS PROGRAM
ARE OF TWO TYPES:1- SCANNERS
2:-ANTIDOTES
SCANNERS
Scanners are programs that scan the
disks to detect viruses. These programs
scan the disk for any known virus. After
scanning the disk and detecting the
virus, they inform the user about the
infected files. The user can then delete
the infected file or get it cleaned by an
Antidote.
ANTIDOTE
Antidote are programmed to detect virus
and clean the infected disk. Cleaning
involves deleting the virus code from the
infected file e.g. an Antidote detects virus in
the boot area of a computer system. It will
then delete the virus code and rewrite the
programs back in their proper place.

SOME POPULAR ANTIVIRUS
SOFTWARES ARE:1- Norton Antivirus
2- Guardian

3- Smart Dog
4- McAfee

etc.
MADE BY – PRANJAL MISHRA
CLASS – 7TH A
ROLL NO. - 7037

More Related Content

ODP
Virus and antivirus final ppt
PPTX
Malware and it's types
PPTX
Virus and malware presentation
PPTX
Compter virus and its solution
PPT
Malicious software
PPTX
Types of malicious software and remedies
PPTX
Types of malware
PPTX
Computer Virus
Virus and antivirus final ppt
Malware and it's types
Virus and malware presentation
Compter virus and its solution
Malicious software
Types of malicious software and remedies
Types of malware
Computer Virus

What's hot (20)

PPT
Malicious
PPTX
Computer Malware and its types
PPTX
Final malacious softwares
PPTX
Securing The Computer From Viruses ...
PPTX
Malicious Software Identification
PPT
Software security
PPT
Lecture 12 malicious software
PPTX
Computer virus 2
PPTX
PPT
Virus and Malicious Code Chapter 5
PPSX
Ids 007 trojan horse
PDF
Malicious software
PPT
Anti virus and current trends
PPT
3.2.1 computer security risks
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
It ppt new
PPTX
Security threats and safety measures
PPTX
Introductio to Virus
PPT
computer security
PPT
Virus09
Malicious
Computer Malware and its types
Final malacious softwares
Securing The Computer From Viruses ...
Malicious Software Identification
Software security
Lecture 12 malicious software
Computer virus 2
Virus and Malicious Code Chapter 5
Ids 007 trojan horse
Malicious software
Anti virus and current trends
3.2.1 computer security risks
SECURITY THREATS AND SAFETY MEASURES
It ppt new
Security threats and safety measures
Introductio to Virus
computer security
Virus09
Ad

Viewers also liked (15)

PPTX
Parts of a computer (power point)
PPSX
Power Point Presentation
PPTX
Good and bad power point presentation
PPTX
Computer 6 (power point presentation) copy
PDF
Networking devices
PPTX
Ppt of types of-network
PPS
Network ppt
PPTX
Networking
PPT
Computer presentation
PPTX
Network Hardware And Software
PPT
Networking ppt
PPTX
Computer networking devices
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
PPTX
Multimedia
PPTX
Introduction to computer network
Parts of a computer (power point)
Power Point Presentation
Good and bad power point presentation
Computer 6 (power point presentation) copy
Networking devices
Ppt of types of-network
Network ppt
Networking
Computer presentation
Network Hardware And Software
Networking ppt
Computer networking devices
BASIC CONCEPTS OF COMPUTER NETWORKS
Multimedia
Introduction to computer network
Ad

Similar to Computer power point presentation (20)

PPT
Presentation2
PPTX
Computer Viruses
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPT
Presentation24190
PPTX
Introduction to computer lec (4)
PPT
Computer viruses and antiviruses
PPT
Computer viruses and antiviruses PPT
PPTX
Computervirus
PPTX
Introductions To Malwares
PPT
Virus project
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
Computer viruses
PDF
computer virus Report
PPT
Virus, Worms And Antivirus
PPTX
Computer viruses
PDF
Computer/Cyber/IT Security MCQ Questions
PPTX
Computer security threats & prevention
PPTX
Computer Viruses
PPTX
Operating System and Virus (Introduction).pptx
PPTX
Societal Impacts Of IT (Class X)
Presentation2
Computer Viruses
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Presentation24190
Introduction to computer lec (4)
Computer viruses and antiviruses
Computer viruses and antiviruses PPT
Computervirus
Introductions To Malwares
Virus project
Computer Virus And Antivirus-Sumon Chakraborty
Computer viruses
computer virus Report
Virus, Worms And Antivirus
Computer viruses
Computer/Cyber/IT Security MCQ Questions
Computer security threats & prevention
Computer Viruses
Operating System and Virus (Introduction).pptx
Societal Impacts Of IT (Class X)

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Spectroscopy.pptx food analysis technology
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
sap open course for s4hana steps from ECC to s4
Spectroscopy.pptx food analysis technology
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf

Computer power point presentation

  • 1. KENDRIYA VIDYALAYA NO- 1 SAGAR (CANTT.) SUBJECT- COMPUTER POWER POINT PRESENTATION SUBMITTED TO MR. V. NEMA
  • 3. INTROUCTION TO INTERNET The internet is a network consisting of thousands of small and large compute networks. In other words internet can be defined as a global network where million of computers are connected to each other. All computers connected on the net can exchange information by following certain rules called Protocols. Therefore a protocol is a set of rules which the computers use to communicate with one another across a network.
  • 4. SERVICIES POVIDED BY INTERNET 1- World Wide Web (www) 2- E-Mail (Electronic mail) 3- News group 4- Chat 5- Bulleting Board Service 6- Video Conferencing 7- File Transfer Protocol (FTP) 8- E-Commerce 9- Telnet 10- Hyper Text Transfer Protocol (HTTP)
  • 5. Components required to connect to Internet 1- A Computer System 2- A Modem 3- An Internet Service Provider (ISP) connection 4- An Internet browsing software.
  • 6. Modem A modem is a computer device to connect to and communicate with other computes via a telephone line. Modem convents digital signals to analog symbols, which is known as Modulation and also converts the analog signals to digital signals, known as Demodulation. Hence the word Modem comes from Modulator and Demodulator. THERE ARE TWO TYPE OF MODEMS AVAILABLE :1- Internal Modem 2- External Modem.
  • 7. INTERNET SERVICE PROVIDER (ISP) Internet Service Provides are companies that provide the Internet connection against charging some fee. ISPs use powerful computes called Savers with high storage capacity and memory, which is connected with other savers through satellites all over the world. The ISPs gives an account number an password to its user to gain access to the Internet. When we want to use the internet, you dial an get connected to an ISP. The ISP then handles al the communication between us and the Internet.
  • 8. ISP IN INIDA SOME OF THE ISPS IN INIDA ARE:- • VSNL • MTML • Manta On-Line • Satyam On-Line
  • 9. WEB BOWSER It is a software, which allows the user to access and browse information on the internet. Without a web browser internet cannot be accessed. Internet Explorer, Netscape Navigator, Opera an Mosaic are common examples of web browses.
  • 10. WEBSITE A website is a collection of web pages which give information about an organization, a topic etc. A website can contain many Hypertext links which link to a piece of text or graphic that is like to some other text, graphic, page or file. TYPES OF WEBSITES :1- .com for Commercial Purposes like Rediffmail.com 2- .org for Organizations like Congress.org 3- .edu for Educational Purposes like imt.edu 4- .gov for Government like inianraiways.gov.in
  • 11. UNIFORM RESOURCE LOCATOR (URL) URL provides an address to locate any site on the Internet. Every website has got a distinct URL. With the help of the URL, the web site is retrieved by the Web Browser. The URL helps the user to identify and locate any resource on the Internet.
  • 12. Search engines Search Engine is a software that helps us to locate Web Pages on the Internet that contain information on the specified topics. We can search for any topic, images, news, video, meaning etc. using the search engines. SOME POPULAR SEARCH ENGINES ARE:1- http.//google.com 2- http//khoj.com 3- http//yahoo.com 4- http// indiatimes.com 5- http//altavista.com 6- http// lycos.com etc.
  • 14. COMPUTER VIRUS A computer virus is a program intentionally designed by a programmer for destroying system files and data of other computers. A virus program duplicates itself without any instruction from the user and damages the data on our disk by corrupting programs, or even formatting the entire hard disk. In other words we can say that virus simply replicates. Virus corrupts or damages the data without the knowledge of the user at a very great speed.
  • 15. How does virus infect a computer system Computer virus spread with the great speed from one computer to another by means of infected disks, networks, programs downloaded from the Internet etc. a floppy disk can also infect a computer. Some virus programs are so well designed that they have a pre-set date or time on which they automatically. Virus can infect the display of a file or keyboard or any program files as word processor, database etc.
  • 16. HOW DOES VIRUS SPREAD Virus can easily spread from one system to another by copying any infected application on starting the computer system. This is because the virus goes into the memory of the computer and starts infecting each application that gets executed by us. The virus programs get transferred into a computer through other virus infected programs, which we copy from floppies, CDs etc. examples of such viruses are Michealangelo, Monkey etc.
  • 17. Different types of virus:Boot virus This type of virus infects the startup area of the hard disk o floppy disk. They attach themselves with the boot area and overwrite on the original instructions and take up control of the system. Booting means stating the computer and loading the operating system. EXAMPLES:Junkee, Ping Pong, Devil, Disk Killer etc.
  • 18. PROGRAM VIRUS This type of virus infect application programs such as word processor, database etc. When the infected fie is executed, the virus gets activated and remains present in the main memory even when the execution of the file is over. When you execute another fie, the virus attaches itself to the new fie and thus another file gets infected. EXAMPLESEnigma, Trojan, Crazy, Yankee Doodle etc.
  • 19. SYSTEM VIRUS These viruses attach themselves to the operating system and infect the input/output unit of the operating system. They always stay in the memory, damage parts of the operating system and then destroy themselves.
  • 20. TROJAN HORSES AND WORMS Trojan horses programs are those programs that are useful to perform certain tasks. But at the same time they damage files or data in the system. This program destroys
  • 21. Effects of virus 1- Viruses generally affect the software, files and folders of a computer. Hardware components are generally immune to viruses. 2- Fie with .exe extensions are soft targets to viruses. 3- Viruses can infect boot records thereby causing booting problems. 4- Other effects of viruses include corruption of data files, periodic hang- ups, slow system performance, loss of data etc. 5- Viruses can also alter the contents and the size of a file. 6- It can change the al the files names to a signal name. 7- It can erase programs or data. 8- It can overwrite entire directories. 9- It can create bad sectors in files and therefore destroy parts of the files
  • 22. PRECAUTIONS WE SHOULD 1- Scan all floppies using antivirus software. 2- Write protect the floppies before coping data from other computer system. 3- Keep backup of all data and files. 4- Prepare an emergency boot disk. 5- Update your Antivirus program periodically. 6- Restrict the use of your computer system so that there is no unauthorized use.
  • 23. We should not 1- Use floppies without scanning them for possible viruses. 2- Run an unknown program without using an antivirus to detect any viruses. 3- Allow everyone to use your computer system. 4- While using Internet do not download anything from the Internet without scanning for viruses.
  • 24. ANTIVIRUS SOFTWaRE Antivirus is a software designed to detect and remove viruses from the computer system. Some types of virus are difficult to remove. Antivirus program gets activated whenever the computer system is booted up. IT DETECTES THE VIRUS AND REMOVES IT. ANTIVIRUS PROGRAM ARE OF TWO TYPES:1- SCANNERS 2:-ANTIDOTES
  • 25. SCANNERS Scanners are programs that scan the disks to detect viruses. These programs scan the disk for any known virus. After scanning the disk and detecting the virus, they inform the user about the infected files. The user can then delete the infected file or get it cleaned by an Antidote.
  • 26. ANTIDOTE Antidote are programmed to detect virus and clean the infected disk. Cleaning involves deleting the virus code from the infected file e.g. an Antidote detects virus in the boot area of a computer system. It will then delete the virus code and rewrite the programs back in their proper place. SOME POPULAR ANTIVIRUS SOFTWARES ARE:1- Norton Antivirus 2- Guardian 3- Smart Dog 4- McAfee etc.
  • 27. MADE BY – PRANJAL MISHRA CLASS – 7TH A ROLL NO. - 7037