Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Effects of computer viruses
Computer viruses and their effects on the computer
Effects of computer viruses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Effects of computer viruses
How computer viruses work
Computer viruses are not understood very well, but they get your attention. Viruses show us how vulnerable we are, but they also show how open and worldly human beings have become. Microsoft and other large companies had to shut down all their e-mail systems when the “Melissa” virus became a worldwide event.
A computer virus is passed on from one computer to another computer. A virus must ride on top of some other program to document in order to perform an instruction. After it is running, it can then infect other programs.
Viruses were first seen in the late 1980s; the first factor was the spread of personal computers. Before the 1980’s home computers were non-existent or they were used for toys, and the real computers were very rare and they were locked away to only be used by the “experts.”
The second factor was the se of the “bulletin boards”; any one could get to a bulletin board if they had a modem and download programs. Bulletin boards led to the precursor of the virus known as the Trojan Horse. It is a program that sounds really cool when you read it, so then people download it, and when people run the program, however, it does something uncool like erasing your disk, so people think that they are getting something neat, but it wipes out their system.
The third factor to viruses is the floppy disk. Programs were small and they could fit the operating system, or a word processor onto the floppy disk, and then turn on the machine and it would load the operating system and everything else off the disk. Viruses took advantage of these three facts to create the first self-replicating programs!
Early viruses were pieces of code attached to programs like games or word processors. People could download an infected game from a bulletin board and run it, and a virus like this is a small piece of code embedded in a larger, legitimate program. The virus loads its self to memory and looks around to see if it can find any programs on the hard disk. When it finds one it modifies it to the virus’s code to the program. Then the virus launches the “real program,” and the user has no way of knowing that it is infected. The next time this program is executed, they infect other programs, and the cycle continues.
This virus searches for a new vulnerable host in order to survive and carry the disease to the next victim. The critical aspect around the spread of a virus is how drastically the reproduction process occurs. Without being controlled, the contamination throughout any species causes the spread to take place in a toxic way, “On day one, there were two people. And then, four, and then, sixteen. In three months, it’s a billion.
It does not envy, it does not boast, it is not proud. It is not rude, it is not self-seeking. It is not easily angered, it keeps no records of wrong. Love does not delight in evil but rejoices with the truth. It always protects, always trusts, always hopes, always perseveres.” 1 Corinthians 13:4-7. I personally believe this is the best verse to explain God’s love for us and how we should love others. Usually love can make people feel angry, because someone is not doing what you want them to do or doing something they should not be doing. The same thing goes for Gods love; we do things all the time that he does not like. Most people sin everyday, whether they know it or not. If people took this verse and applied it to their marriages, the world would be a better
Catchy jingles are what persuades consumers to buy more and more products that they hear about every day. This concept has been around for years and the Coca-Cola Company is no stranger to it. Back in July of 1971, Coca-Cola released the commercial, “I’d like to Buy the World a Coke” that sent their customers into chaos with over 100,000 letters being sent to the company asking for more. This leaves many people asking: how did this one commercial have such an impact on the audience? And what did Coca-Cola use that drew so many people in? Here we will discover the method behind what is “I’d like to buy the World a Coke.”
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
Imagine starting up your computer only to see the image on the screen melt while eerie music plays. The hard drive crunches away. What is it doing in there? Before you turn off the machine, most of your files have been deleted. Your computer is the victim of a computer virus. But where did the virus come from? It may have been that game you borrowed or, more likely, it came from an electronic document.
ways, perhaps the best thing to do is more a form of damage control rather than
Nurses are faced with ethical dilemmas in their practices often. Respecting a patient’s belief or choice, whether we think it is right or wrong, is a must. Jehovah Witness (JW) patients refuse blood transfusions and their life can be in danger, but that is their right to choose and nurses must respect that. Patients decide not to have a lifesaving surgery or chemotherapy, which is their personal decisions. We, as nurses, can educate and inform, but eventually it is the patient’s right to refuse or accept treatment. This writer feels that when good morals and character are in place, the best possible ethical decisions can be made. These decisions are not necessarily right or wrong, but the best choices for the patient and their care based on the patient’s right to
...ence of GM crops is that genetic modifications can develop proteins in plants which a consumer could be allergic to. For example, one of the most common allergies is with the peanut. What would happen if peanut proteins interlace into tomato seeds? Then people with peanut allergies would not be able to eat genetically modified tomatoes. There are many reasons to stop the production of GM food. It can produce serious long-term nature accidents, but there is no way to know much about it until is too late (“GM Food” 2).
Malware is short for "malicious software”. It is a software installed (usually without someone’s knowledge) to disrupt computer operation, gather information, or gain access to private computer systems. Malware can appear in the form of a code, a script, an active content or other software’s. Once malware enters a computer it is capable of basically spying any actions that are taken using that computer. Any internet surfing, typing in your passwords by observing every keystroke, stealing personal information and identities, reading the emails that are received or sent through the computer, hijacking your browser to web pages that ‘phish’ for your personal information, and a variety of other invasive tactics are used by the ha...
The four fundamental nursing responsibilities of promoting health, preventing illness, optimizing health and alleviating the ill are represented in the code of ethics. (Arnold & Boggs, 2016) One can say that the code of ethics are rules that a nurse needs to follow in order to effectively communicate and protect the patients. The American Nurse Association provided the code of ethics to guide nurses to ensure that patient’s care, safety, rights and health are well cared for and well managed. Models like Utilitarian, deontological, and the human rights-based all contribute in answering dilemmas that can arise with a patient. Thus, explaining what some of the code of ethics are, and how the code of ethics influence our responsibilities as a nurse will impact the overall care of the
It is not only fascinating to understand the myriads of ethical issues in health care, but also to recognize the challenges inherent in these issues. To make informed decisions or judgments in the resolution of some of these ethical challenges will require a good knowledge and understanding of ethics and its application. The import of this course to me can not be overemphasized. It is great to be instructed by a Registered Nurse, who also is ...
In conclusion, there are numerous legal and ethical issues apparent in the nursing practice. Nurses should study and be as informed as they can with ethics and legality within their field in order to ensure no mistakes occur. Ethical issues vary based on patient’s views, religion, and environment. Nurses are influenced by these same views, but most of the time they are not the same as the patients. As a nurse we must learn to put the care of our patients and their beliefs, rights, and wishes before our own personal
Viruses are programs that attach themselves to legitimate programs with malicious intent. It is designed to spread from one host to another. Once a virus has successfully attacked, the program will remain dormant until the device has to execute its code. Once infected the computer virus can infect other devices on the same network and cause some major damage. These damages include corrupting files and even taking over the
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.