• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3404

Defining computer viruses

Extracts from this document...

Introduction

In defining computer viruses Parsons and Oja wrote that the technical definition of a computer virus is a set of program instructions that attaches itself, and spreads to other files. Viruses corrupt files, destroy data, displays irritating messages, or otherwise disrupt computer operations. (185) In continuing, Parsons and Oja explained that there is a common misconception that viruses contain program codes to spread themselves from one computer to another. They do not. The reason viruses spread is because people redistribute infected files by exchanging disks and compact discs, sending e-mail attachments and downloading software from the Web. (185) For the book titled Computer Concepts, it is learned that a computer virus generally infects the files executed by your computer such as those with .exe, .com or .vbs extensions. When a computer executes an infected program, it also executes the attached virus instructions. These instructions then remain in the Random Access Memory, waiting to infect the next program that the computer runs or the next disc it accesses. (185) In addition to replicating itself, a virus might perform a trigger event, sometimes referred to as payload. The resulting effects can range from displaying an annoying message to corruption of data on the computer's hard disk. Trigger events are often keyed to a specific date. The Michelangelo virus, for example was designed to damage hard disks on March 6, the birthday of artist Michelangelo. (185) A key characteristic of viruses is their ability to lurk in a computer for days or months, quietly replicating themselves. While this is taking place, a user might not even know that his or her computer has a virus; therefore it is easy to inadvertently spread infected files to other people's computers. (185) According to CNN.com Technology, there are thousands of variations of viruses, most falls into one of the following six general categories, each of which works its magic slightly differently. ...read more.

Middle

This type of e-commerce is known as Business to Business and it account for some 80% of the total value of all e-commerce operations. However, individuals have also been drawn to the internet for commercial reasons. For example, many individuals are using the Internet to buy directly from retailers in e-commerce. Examples include amazon.com and dell.com. The reasons for the emergence of such activity include convenience, greater choice and savings. There's no doubt the adoption of Web technology provides a company with the opportunity to change its relationships with the organizations and individuals with which it does business--from trading partners to suppliers, from internal customers to end customers. Perhaps the greatest opportunity for change lies in the collaborative capabilities the Internet provides. The Internet supports the transition of transacting business through discrete, predictable, serial processes to a more cyclical, dynamic approach. The Internet provides a means to readily adapt technology that lets all parties work from the same system, using the same information, in a real-time environment. Communication is integral part of businesses. Communicating status and changes regarding product-development schedules is just one way in which the Internet is changing business relationships. The Internet has given businesses the ability to increase their communication to their internal and external customers and break down perceived barriers to management. For example, business associates can receive updates from the chairman via the Internet, as well as talk directly with him through regular Web chats. Through broadcasts over the Web, we hear the message delivered at financial-analyst meetings at the same time the analysts are receiving it. In addition, a manufacturer alerting everyone immediately of a delay and reflecting this delay on the shipment schedule in real time gives retailers, transportation companies, and importers the opportunity to take corrective measures. The Internet also permits retailers to become more customer focused and responsive. External customers now have the power to determine when they shop, what they want to shop for, and how they want to receive the goods (by mail, by truck, or for pickup at the nearest store). ...read more.

Conclusion

However it must be noted that a virus can store itself on a backup disk, therefore is necessary to run a virus check before backing up data or you may reinstall infected files. In continuation, businesses which engage in e-business may find it prudent to engage in a full time, on staff security specialist. In addition, businesses should have access to, or contact with, firms that specialise in cyber security. Cyber security requires daily attention in order to keep up with and stay ahead of the threats that emerge almost daily. In relation to e-mail viruses, users at businesses should consider deleting, unexpected or unrequested e-mail, or e-mail from someone they don't know. This is because many viruses are sent in e-mail attachments. It must be noted also, that if you receive a suspicious e-mail from someone you know, it is possible that their computer is infected with a virus. Though many view viruses negatively, there are viruses that could be considered "good." The Potassium Hydroxide (KOH) virus has the unique distinction of being a beneficial virus. The virus asks the user for permission to encrypt all the data on the user's hard disk or floppy disk once infecting a machine. If the user chooses not to accept, the virus simply deletes itself. Aside from this beneficial behavior, the virus has the same infection methods as any other virus. Currently, viruses like any other program need the intervention of a process or someone to run. Also, like any other program viruses usually contain bugs that could inactive their destructive behaviors. Viruses are limited to certain vehicles of transference like the Internet or a floppy disk. However, with improving technology, viruses can circumvent some or all of these limitations. Cellular phones, Pocket Personal Computers (PC), and other handheld devices that use wireless communication and email may become infected with a new strain. Because of the pervasiveness of technology, it encompasses much of the good -- and plenty of the bad -- of the whole wide world. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    7. PHYSICAL WEB SITE DESIGN AND IMPLEMENTATION 7.1 Data Mining techniques Since CRM is a major marketing strategy for SK-II, the usage of CRM and OLAP software can help companies improve the profitability of their interaction with customers through individualization. The followings are general guidelines for building a customer information data

  2. This report gives the clear idea about current statistical situation in e-learning trends.Task 2 ...

    privately as well as separate audio conference and Voice over IP to use the computer to deliver audio to students and instructors. Web and Video Conferencing Virtual collaboration tools such as Web and video conferencing are particularly attractive because they allow organizations to leverage a key asset, their employees.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    (Smith and Chaffey 2002, p.49) This table explains the online equivalents of these recognised communication tools: 1. Advertising Banner Ads 2. Selling Virtual sales staff, affiliate marketing, web rings, links 3. Sales Promotions Incentive rewards, loyalty schemes such as Beenz 4.

  2. WHAT DO YOU GENERALLY LIKE DOING AT THE WEEKENDS?

    I dreamed of visiting the house of Miki Mouse, Donald Duck and so on all my life. Los Angeles, with its mild climate, unique atmosphere and interesting sights, is one of the favourite holiday destinations for all tourists. And not only tourists but many also rich and famous people decide

  1. The world of the United States Post Office is rapidly transforming due to the ...

    The Postal Service has undertaken a variety of new strategies in an attempt to cut five billion dollars in expenses by 2006, in hopes of eventually realizing profits once again. Although the Postal Service is plagued by many of the typical problems that any large commonwealth industry is prone to,

  2. ICT IN ORGANIZATION

    Communication Tesco sees communication with its customers as a big priority, it proves that they care about what their customers think and want. Via the Tesco Club cards they can communicate with their customers and send them rewards for shopping at their store.

  1. Powerpoint technical Report

    This keeps a consistent theme through-out the PowerPoint, instead of having a mixture of colours on each slide, which makes the presentation look unprofessional and inconsistent. If I had not included a design template, I would have completed the following steps to incorporate master slides into my PowerPoint: 1)

  2. The creation of the computer and Internet has affected businesses in many positive ways.

    more efficient than ever before. Advertising on the Internet has been increasing and is viewed while surfing, reading e-mail, and spending time on the web in general. We are probably exposed to about 35 'pop-up' ads continuously, one after another, just by simply entering a single web site.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work