Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Abhi Thakur 7 years, 8 months ago
- 2 answers
Posted by Just Arushi 7 years, 8 months ago
- 0 answers
Posted by Kunal Singh Maurya 7 years, 8 months ago
- 0 answers
Posted by Shivani Tiwari 4 years, 3 months ago
- 1 answers
Sia ? 4 years, 3 months ago
Domain Name: When you create a website, you will have to give a name to it. Such as this particular site is called www.indiastudychannel.com. It is the identity of the "website" over the internet, and any user asking for it is redirected to this website. Every website has a unique name. The www represents that WORLD WIDE WEB, then comes the name of the site, and finally the .com for commercial or .org for organisation, representing the kind of website, or locality of it like .in for India and .uk for United Kingdom.
IP Address: Now, something different from the domain name, IP Adress is the identity of your computer over the internet network. They are ususally numbers sets like: 172.16.254.1. Every computer will have a unique IP address while using the web. This particular thing can be used by security sources to track you down in case you do something illegal over the internet.
Posted by Rupsi Thakur 4 years, 3 months ago
- 1 answers
Sia ? 4 years, 3 months ago
Hacker | Cracker |
The good people who hack for knowledge purposes. | The evil person who breaks into a system for benefits. |
They are skilled and have a advance knowledge of computers OS and programming languages. | They may or may not be skilled, some of crackers just knows a few tricks to steal data. |
They work in an organisation to help protecting there data and giving them expertise on internet security. | These are the person from which hackers protect organisations . |
Hackers share the knowledge and never damages the data. | If they found any loop hole they just delete the data or damages the data. |
Hackers are the ethical professionals. | Crackers are unethical and want to benifit themselves from illegal tasks. |
Hackers program or hacks to check the integrity and vulnerability strength of a network. | Crackers do not make new tools but use someone else tools for there cause and harm the network. |
Hackers have legal certificates with them e.g CEH certificates. | Crackers may or may not have certificates, as there motive is to stay annonymous. |
Posted by Shivi Tripathi 7 years, 8 months ago
- 0 answers
Posted by Deepanshu Rajput 7 years, 8 months ago
- 0 answers
Posted by Sanaya Sanaya 7 years, 8 months ago
- 0 answers
Posted by Yukti Gupta 7 years, 8 months ago
- 0 answers
Posted by Tarakanta Behera 7 years, 8 months ago
- 0 answers
Posted by Harsh Chauhan 7 years, 8 months ago
- 0 answers
Posted by Mohd Zaid 7 years, 8 months ago
- 0 answers
Posted by Ashiya Patel 7 years, 8 months ago
- 0 answers
Posted by Krishnakant Pathak 7 years, 8 months ago
- 0 answers
Posted by Roshan Pandey 7 years, 8 months ago
- 0 answers
Posted by Gopesh Pandey 7 years, 8 months ago
- 0 answers
Posted by Vansh Jaiswal 7 years, 8 months ago
- 0 answers
Posted by Yashita Chawla 7 years, 8 months ago
- 1 answers
Posted by Rajveer Singh 7 years, 8 months ago
- 0 answers
Posted by Cool But At School 7 years, 8 months ago
- 0 answers
Posted by Anshuman Nautiyal 7 years, 8 months ago
- 0 answers
Posted by Sahaj Veer 7 years, 8 months ago
- 0 answers
Posted by Anubhav Agarwal 7 years, 8 months ago
- 1 answers
Posted by Harsh Vardhan 7 years, 8 months ago
- 0 answers
Posted by Harsh Vardhan 7 years, 8 months ago
- 0 answers
Posted by Vasu Raturi 7 years, 8 months ago
- 0 answers
Posted by Cool But At School 7 years, 8 months ago
- 1 answers
Posted by Sakshi Soni 7 years, 8 months ago
- 0 answers
Posted by Akash Kumar 4 years, 3 months ago
- 1 answers
Sia ? 4 years, 3 months ago
Computer Virus | Computer Worm |
A computer virus is a program, wherein a code copies itself and replicates itself to other programs/files on a device and may result in corrupting or damaging the device | A computer worm is an independent malicious program, which when enters a system can start causing harm/damage to the device |
An initiation is required by the host, i.e., a virus spreads only when an infected program is executed in a device | A worm only needs to enter the device, then it can automatically affect the other files and programs. No execution is needed |
Few different types of computer viruses include:
|
Few of the different types of computer worms are as follows:
|
A virus may spread when a file is open and then the same malicious code is copied and spread around whenever other files are opened in the host computer | A worm only requires a medium to enter the device. This may be through the internet, email, online messaging applications, etc. |
Time taken by a virus to spread in the system is lesser in comparison to a worm | A worm can quickly spread through a device |
A virus corrupts the files or deletes them automatically | On the other hand, a worm also affects the bandwidth and network connections of the device |
Examples of computer virus include Creeper, Blaster, Slammer, etc. | Examples of computer worm include Morris worm, storm worm, etc. |
Posted by Sahil Patel 7 years, 8 months ago
- 0 answers
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
Aman Singh 7 years, 8 months ago
0Thank You