0% found this document useful (0 votes)
8 views13 pages

6)

The document outlines essential computer knowledge for UPSC EPFO, covering topics such as network topologies, the internet's structure, email, e-commerce, and types of hacking and viruses. It details hardware and software requirements for internet connectivity, the definition and structure of emails, and the significance of domain names and web browsers. Additionally, it explains various types of malware and cyber threats, emphasizing the importance of cybersecurity.

Uploaded by

tupakula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views13 pages

6)

The document outlines essential computer knowledge for UPSC EPFO, covering topics such as network topologies, the internet's structure, email, e-commerce, and types of hacking and viruses. It details hardware and software requirements for internet connectivity, the definition and structure of emails, and the significance of domain names and web browsers. Additionally, it explains various types of malware and cyber threats, emphasizing the importance of cybersecurity.

Uploaded by

tupakula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

COMPUTER KNOWLEDGE

UPSC EPFO – Lecture 6

By: Dikshant Sharma


LECTURE 6 - Scope
I. Network
i. Network Topologies
II. What is INTERNET?
i. TCP/IP & it’s role in working of INTERNET
ii. Who Governs INTERNET?
iii. HARDWARE / SOFTWARE Requirements for INTERNET
iv. DOMAIN NAME
v. Web Browser
III. E-Mail – Definition & Structure
IV. E-Commerce / E-Payments (BHIM / UPI)
V. Hacking / Virus – Definition & Types (Malware, Adware, Spyware Etc.)
HARDWARE for INTERNET
1. MODEM – To convert analog to digital and digital to analog.
2. HUB – Place of convergence where data arrives & is forwarded
3. BRIDGE – It is a network that connects two or more networks
4. ROUTER – Router determines the next network point to which data packet should be
forwarded. Available at low prices these days and enable connection to more devices
5. GATEWAY – Entrance to another network
SOFTWARE for INTERNET
1. HTTP – Hypertext Transfer Protocol
▪ Defines the format for communication between web browsers and web servers
2. IMAP – Internet Message Access Protocol
▪ Defines format for communication between E-mail servers and clients
3. SSL – Secure Sockets Layer
▪ Developed by NETSCAPE for transmitting private documents
4. TCP/IP – Transfer Control Protocol / Internet Protocol
▪ Main protocol used in the INTERNET – It manages all the information that moves across the internet
5. FTP – File Transfer Protocol
▪ Standards that establish the format in which files can be transmitted from one computer to another.
6. TFTP – Trivial File Transfer Protocol
7. SMTP – Simple Mail Transfer Protocol
8. HTML – Hypertext Markup Language
9. SGML – Standard General Markup Language
10. URL – Uniform Resource Locator
WEBSITE
• A website is a collection of web pages and related content that is identified by a common
domain name
• Websites are the most important element of the internet.
• The central page of a website is called a home page.
• Home Page - is usually the first page you see when you call a website up and can also be
called a ‘start page’ or ‘index page’. From here onwards, the user delves into the site’s
subpages.

Types of Website:
1. Static – Having fixed and display the same content for every user, usually written
exclusively in HTML.
2. Dynamic – They can display different content and provide user interaction, by making
use of advanced programming and databases in addition to HTML.
DOMAIN NAME
➢ A domain name is your website name.
➢ A domain name is the address where Internet users can access your website.
➢ A domain name is used for finding and identifying computers on the Internet.

Categories :
1. .com – Commercial Institutions or organization
2. .edu – Educational Institutions
3. .gov – Government sites
4. .mil – Military Sites
5. .net – Gateways and administrative hosts
6. .org – Private Organizations
WEB BROWSER
A web browser is a software application for accessing information on the World Wide Web.
E-MAIL
An email address is a unique address, which identifies a location to send and
receive email. It contains username, followed by an “@” symbol and then
domain name

EMAIL ID - [email protected]

Structure of EMAIL :-
1) From – Contains Email ID and name of the sender optionally
2) To – To another email ID and optionally name of the receiver
3) Subject – Brief summary of the contents of the message
4) Date – Local time when the message was sent
5) CC – Carbon Copy
6) BCC – Blind Carbon Copy
E-COMMERCE / E-PAYMENTS
Ecommerce, also known as electronic commerce or internet
commerce, refers to the buying and selling of goods or
services using the internet, and the transfer of money and
data to execute these transactions.
Ecommerce is often used to refer to the sale of physical
products online, but it can also describe any kind of
commercial transaction that is facilitated through the
internet.

E- PAYMENTS
BHIM – Bharat Interface for Money –
Initiative to enable fast, secure, reliable cashless payments through
your mobile phone

UPI – Unified Payments Interface – Instant real-time payment system


developed by National Payments Corporation of India facilitating inter-
bank transactions
COMPUTER HACKING / VIRUS
HACKING – Is an attempt to exploit a computer system or a private network inside a
computer. It is the unauthorized access to control over computer network security systems
for some illicit purposes.
Viruses, Trojan Horse, Password Cracking are all types of Computer Hacking!

VIRUS - A virus is a parasitic program that infects another legitimate program, which is
sometimes called the host. To infect the host program, the virus modifies the host so that it
contains a copy of the virus.

“ILOVEYOU” Virus – The most dangerous virus world has seen


• Managed to wreck PCs all across the world.
• Infecting almost 10% of the world’s PCs connected to the
Internet, the virus caused a total damage of around $10
billion.
COMPUTER HACKING / VIRUS
Types of virus –
1. Malware - is short for malicious software. Malware is designed to cause damage to a stand
alone computer or a networked pc. So wherever a malware term is used it means a program
which is designed to damage your computer.
2. Adware - Generically adware is a software application in which advertising banners are
displayed while any program is running. Adware can automatically get downloaded to your
system while browsing any website and can be viewed through pop-up windows or through a
bar that appears on a computer screen automatically. Adware's are used by companies for
marketing purpose.
3. Spyware - Spyware is a type of program that is installed with or without your permission on
your personal computers to collect information about users, their computer or browsing
habits tracks each and everything that you do without your knowledge and send it to remote
user. It also can download other malicious programs from internet and install it on the
computer.
4. Worms - A worm is a program whose purpose is to duplicate itself.
5. Trojan Horses - A Trojan horse, or Trojan, is a type of malicious code or software that looks
legitimate but can take control of your computer. A Trojan is designed to damage, disrupt,
steal, or in general inflict some other harmful action on your data or network.
COMPUTER HACKING / VIRUS
6. Phishing - It is a cyber crime in which targets are contacted by email, telephone or text
message by someone posing as a legitimate institution to lure individuals into providing
sensitive data such as banking passwords, credit card details etc.
7. Denial of service - DDOS - It is a type of cyber attack in which the attacker seeks to make
a machine of network resource unavailable to its users. Example - Can be done by
putting too much load on the server. Overload the server. Used to hamper work of bigger
organizations.
8. Man in the middle - When the attacker positions himself in a conversation between a
user and an application - either to eavesdrop or to impersonate one of the parties
making it appear as if a normal exchange of information is underway.
9. Crypto Jacking - It is an emerging online threat that hides on a computer or mobile
device and uses the machine’s resources to mine forms of online money known as
cryptocurrencies.
10. SQL Injection - This is one of the most common web hacking techniques. The attacker
can interfere with the queries when a person is filling up a form or username/password.

You might also like