Preview

Role of Computer in the Society

Good Essays
Open Document
Open Document
375 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Role of Computer in the Society
How do I list them?
1. First, write one or two sentences about your topic.
2. Next, underline all of the specific words that describe your topic.
3. Make a separate list of these specific words.
4. Add to your list any other words that mean the same thing (synonyms) or are related terms.
5. Think of more words or phrases that describe the larger topic, of which your topic is a part. Add those to the list.
6. Think of more words or phrases that are subtopics of your topic which might help you find you useful information. Add those to the list.
Now you should have a pretty long list of words and phrases that you can use to search for information. If one word isn't in a book's index or doesn't turn up any results on an electronic search, try another word or a combination of words.
Computer virus
A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.
By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email's File Attachments for details.)
When a virus is introduced to a computer system, it can attach itself to, or sometimes even replace, an existing program. Thus, when the user runs the program in question, the virus is also executed. This usually happens without the user being aware of it.
A virus program contains instructions to initiate some sort of "event" that affects the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    3. Exercise Do It! 9. Match the statement with the term most directly associated with it.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Summarize comprehensively your selected article. Include in your summary brief discussions about the following:…

    • 173 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CAFS IRP Project Plan

    • 910 Words
    • 3 Pages

    4. Rewrite your topic area as a research questions i.e. A hypothesis / or statement?…

    • 910 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    P3 and D1 Assignment 1

    • 1224 Words
    • 3 Pages

    Virus protection checks for intruders on the computer, it tries to trace viruses, worms and Trojans by spotting their virus signature. This is a sequence of characters that an anti-virus traces by analysing the virus code. At the same time this is happening, people that write viruses attempt to block the anti-virus software by polymorphing, which allows a virus to change its appearance each time it infect a PC. With this happening all the time a new virus is created, anti-virus software produce updated version of its software to keep users protected.…

    • 1224 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    B. Brain-storming , make a list of every idea that comes to mind. Don’t exclude anything. Don’t worry about putting these thoughts in order. Right now you’re just writing down everything you think might be a possible focus for your paragraph. You may end up not using most of these ideas.…

    • 859 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Use linking words and phrases (e.g., also, another, and, more, but) to connect ideas within categories of information.…

    • 1662 Words
    • 7 Pages
    Good Essays