0% found this document useful (0 votes)
89 views42 pages

Search Engine

The document discusses search engines, how they work through crawling websites, indexing content, and retrieving relevant results for user queries. It also discusses popular search engines like Google and Yahoo, and how to perform basic searches through them. Additionally, it covers intranets, extranets, and common computer security threats like viruses, worms, adware, and hackers - describing examples of each and the problems they can cause. Methods of preventing virus infections are also outlined.

Uploaded by

iqra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views42 pages

Search Engine

The document discusses search engines, how they work through crawling websites, indexing content, and retrieving relevant results for user queries. It also discusses popular search engines like Google and Yahoo, and how to perform basic searches through them. Additionally, it covers intranets, extranets, and common computer security threats like viruses, worms, adware, and hackers - describing examples of each and the problems they can cause. Methods of preventing virus infections are also outlined.

Uploaded by

iqra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Topic

Search engines
Content:
1. Deff of search engines
2. Searching the web
3. Popular search engines
4. Use of Google search engines
5. Use of yahoo search engines
6. Intranet
7. Extranet
8. Computer security threat
9. Causes of virus ,worm ,adware
10.antivirus
Search engines:
Search engines is a website that
provides the facility to find the required websites on a
particular topic. A user can search any topics on internet
using search engines. Internet contains a lot of
information. A large number of websites about different
websites using search engines.
Search engines contains the record of many websites. It
search the required websites and display them to the user.
Search engines are very powerful tools for finding
information.
How search engines work?
Every search engine has three main functions:

i. Crawling (to discover content)


ii. Indexing (to track and store content)
iii. And retrieval (to fetch relevant content when users
query the search engine).
Crawling
Crawling is where it all begins: the acquisition of
data about a website.
This involves scanning sites and collecting details
about each page: titles, images, keywords, other
linked pages, etc. Different crawlers may also
look for different details, like page layouts, where
advertisements are placed, whether links are
crammed in, etc.
Indexing
Indexing is when the data from a crawl is processed and
placed in a database.
Imagine making a list of all the books you own, their
publishers, their authors, their genres, their page counts,
etc. Crawling is when you comb through each book while
indexing is when you log them to your list.
Now imagine it’s not just a room full of books, but
every library in the world. That’s a small-scale version of
what Google does, who stores all of this data in vast data
centers with thousands of petabytes worth of drives
Retrieval and Ranking
Retrieval is when the search engine
processes your search query and returns the most
relevant pages that match your query.
Most search engines differentiate themselves
through their retrieval methods: they use different
criteria to pick and choose which pages fit best
with what you want to find. That’s why search
results vary between Google and Bing, and why
Wolfram Alpha is so uniquely useful.
Basic step to use of search engines
Step 2.
Select type of
search you want
to run

Step 1. Go to search engine


Step 3. View hits

Step 4.
Click
link to view
Web site
p. 80 Fig. 2-12 Next
Searching the web:
Keywords are used to search the required information from search
engine. The keyword is typed in double quotation if it consists of two or
more words.
For example:
the following keywords can be used to search information
about Pakistani universities:
“Pakistani universities”
“universities in Pakistan”
The Boolean operators are as fallows:

AND operator OR operator NOT operator


 The eleven basic types of Web sites
 Portal
 News
 Informational
 Business/Marketing
 Educational
 Entertainment
 Advocacy
 Blog
 Wiki
 Content Aggregator
 Personal

p. 82 – 84 Fig. 2-14 Next


Using Google search engine:
The following method is used to find information using Google search
engine:
1) Open the web browser.
2) Type ww.google.com in the address bar and press enter. Google home
page will appear.
3) type in the keywords “entitle India” in the text box.
4) Click Google search button. The search will start and a list of web sites
related to the search topic will appear.

5) Click any website to open it.


Using yahoo search engine:
The following method is used to find information using yahoo search
engine:
1) Open the web browser.
2) Type www.yahoo.com in the address bar and press enter. Yahoo
home page will appear.

3) Type in the keywords related to the search in the text box.

YAHOO! UPCAT result 20 × search


4) Click search button. The search will start and a list of web sites
related to the search topic will appear.

5) Click any website to open it.


Intranet:
Intranet is an internal network of an organization that uses internet technologies.
It is normally used to provide the information of the organization to the
employees. It is a small internet within an organization. It uses TCP\IP
technologies employees.
Extranet:
Extranet is a collection of two or more intranets. Different organizations can
use extranet to share the information of their intranets. An organization can
apply security measures to provide limited access to the employees of other
organization using the extranet.
Computer security threats:
Computer security
is used to protect computer system and data. it protects computer
system from damage as unauthorized access. Different methods are
used to ensure the security of a computer system.
A computer security threats is any event or action that can cause loss
of damage to computer hardware , software , data , information or
processing capability. There are different threats to computer
security. some security threats may occur accidentally and come may
occur intentionally.
Some important computer security threats are as follows:
1) Virus
2) Worm
3) Adware
4) hacker
1. Virus:
Computer virus is a program that may disturb the normal working
of computer without the knowledge or permission of the user. it is the most common
and well known computer security threat. Virus attaches itself to the files in flash
drives, hard disks and email attachments. A file containing a virus is called infected
file. The virus is activated when the infected file is executed.
Example:
1) CASCADE
2) ZMIST
3) BLASTER
4) ANTIEXE
5) FRODO

Problems caused by virus:


Virus can cause many problems. It may:

 damage the stored files


Erase data stored on the disk
Affect the normal working of the computer
Display unusual massages
Types of Computer Virus
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Script Virus
Trojan Horse
Time Bomb
A time bomb is a virus program that performs an
activity on a particular date
Logical Bomb
A logical bomb is a destructive program that performs an
activity when a certain action has occurred.
Worm Virus
A worm is also a destructive program that fills a
computer system with self-replicating information,
clogging the system so that its operations are slowed
down or stopped
Boot Sector Virus
A boot sector virus infects boot sector of computers. During
system boot, boot sector virus is loaded into main memory
and destroys data stored in hard disk.
Macro Virus
A macro virus is associated with application software like
word and excel. When opening the infected document, macro
virus is loaded into main memory and destroys the data
stored in hard disk.
Trojan Horse
Trojan Horse is a destructive program. It usually pretends as
computer games or application software. If executed,
computer system will be damaged. it usually comes with
monitoring tools and key loggers
Script Virus
Commonly found script viruses are written using the
Visual Basic Scripting edition (VBS) and the
JavaScript programming languages
Actions to prevent virus infection
1. Always update your anti-virus software at least weekly.
2. Back up your important files and ensure that they can be
restored.
3. Empty floppy drives of diskettes before turning on
computers, especially laptops.
4. Forget opening unexpected e-mail attachments, even if
they're from friends
5. Install security updates for your operating system and
programs as soon as possible.
6. Jump at the chance to learn more about your computer.
This will help you spot viruses.
2. Worm:
It is a program that copies itself repeatedly in memory or on disk until there left
no space. The computer may stop working in this situation. Worm spreads from
one computer to another through networks.
Example:
1) SQL slammer
2) the blaster worm
3) Sesser
4) Melissa
Problem caused by worm:
worms can cause different problems. it may:

Destroy files stored on the computer


Slow down the computer
Cause come programs to stop working
3. Adware:
Advertisements on the computer without the
permission of the user. The advertisements may appear in the form of banner
or pop-up windows. adware records the interests of the user while using the
internet. It displays the advertisements according to the interests of the user.
Ti may also download some malicious software on the computer. Adware can
be a part of user interface of the software. it may also appear during software
installation.
Examples:
its examples are as follows:
1. Dollar revenue
2. MIRAR toolbar
3. Comet cursor
Hacker:
A person who accesses a computer, network and its
resources illegally is known as hacker. Hackers are computer
experts and use their computer knowledge for negative purpose.

Problems caused by hacker:


the hacker may steal the following.

The information of the client or customer


Credit card details for unauthorized use
Passwords to access computers and networks illegally
Email passwords to use email account without user’s knowledge
Causes of spreading virus, worm and adware:
The causes of spreading virus, worm and adware are as follow:
1. Infected flash drives of disks
2. Email attachments
3. Surfing insecure websites
4. Installing pirated software
Antivirus:
Antivirus software is very important for the safety of a computer system. It
protects the data and files stored on the computer from different security
threats. The latest antivirus program must be installed on the computer.
The antivirus software should be managed properly to detect and remove
viruses, warms and adware from the computer system. Many new viruses are
created and spread continuously. The antivirus software must be updated
regularly in order to protect the computer properly.

Types:
These types are as follows:
MCAFEE
AVG
Norton
Kaspersky
Ad Aware
1. AVG
AVG is one of the most popular antivirus
programs that can be obtained for free, and it’s easy to
download directly from the internet. In addition to
not taking up a significant amount of space on a hard
drive, it can also work with a number of different
Windows operating systems. It incorporates both
antivirus and antispyware abilities and works by
scanning all the files on the computer at regular
intervals. Additionally, it has the ability to quarantine
virus files so that they cannot do any harm before they
can be checked and deleted.
2. McAfee
McAfee Virus Scan has been the second most
popular antivirus program on the market for years,
which has enabled the company to cement their
position as a strong competitor to Symantec. It
provides spyware and virus protection within one
program, rather than separately as many other
programs do. It is necessary to take out a subscription
to use McAfee, but it will give you access to
continuously updating virus protection.
3. Norton
There are a number of Norton antivirus
programs available, all produced by Symantec. They
have quickly proven themselves to be a market leader
when it comes to computer system security, with
their products available from a range of different
electronics supply stores. Norton programs are used
by the majority of computer users on the market,
who pay an annual fee for a subscription service.
Norton Anti-Virus and Norton Internet Security are
software programs that search the computer
regularly and delete any viruses that they find.
4. Kaspersky
Russian-developed Kaspersky is not the
most popular of all the antivirus protection
programs; many people have probably never
heard of them. However, they still provide a
very effective product for protection against
viruses, spyware, and Trojans. Kaspersky
Internet Security and Kaspersky Antivirus
prevent problems that computers will
encounter in the event that they become
infected.
5. Ad Aware
This software by Lavasoft is another antivirus
program that provides protection against a large
number of cyber security threats that arise from using
the Internet. They offer different levels of protection
according to how much you want to spend in a one-
off payment for the program. In addition to finding
and removing viruses and spyware that can detect key
strokes and passwords, it will protect against Trojans.
Advancements in anti-malware technology allow it to
provide effective protection while not putting
excessive pressure on the system in the process.
Managing an antivirus:
Antivirus software is very important for
the safety of a computer system. It protects the data and files
stored on the computer from different security threats. The
latest antivirus program must be installed on the computer.
The antivirus software should be managed properly to detect
and recover viruses, worms and adware from the computer
system. Many new viruses are created and spread continuously.
The antivirus software must be up-dated regularly in order to
protect the computer properly.
Virus definitions\updates:
A virus definition is also called
virus signature. Virus definitions contain the information about
different security threats like virus, worm and adware. The
antivirus software identifies different viruses using the virus
definitions while scanning the computer. The file containing
virus definitions is automatically installed when the antivirus
software is installed on the computer.
The
End

You might also like