ICSE E-World 7.Indd

Total Page:16

File Type:pdf, Size:1020Kb

ICSE E-World 7.Indd Contents 1. Computer—Hardware components 1 Adjusting Row Height and Column Width in a Data and Information Worksheet Hardware and Software Formatting—Numerical Data, Text, Working of a Computer Aligning, Borders, Background Colour and External Hardware Patterns Storage Devices AutoFill Internal Hardware 6. Database and DBMS—An Introduction 66 2. Number System—An Introduction 16 Database and DBMS Number System File-oriented and database approach Ltd Decimal Number System Characteristics of database approach Binary Number System Uses of database Octal Number System Starting Microsoft Access Hexadecimal Number System Creating Database Pvt. Conversion between Number System Components of Microsoft Access 2010 window Conversion between Decimal Fractions and Objects and Tables in Access Binary Query 3. Computer Virus 24 7. More on HTML 86 Computer Virus Lists Malware Tables Types, Traits and Symptoms of Virus Forms Services Computer security Image Antivirus Software Hyperlinks 4. Ethics and Safety Measures in Computing 34 8. Looping statements in QBasic 108 Computing Ethics Introduction to Loops Unethical Practices Parts of a Loop Preventine Measures Types of Loops: Counter Method, Firewell FOR-NEXT Loop, WHILE-WEND Loop, Parental Control Education DO Loop Digital Footprints Exiting Loops 5. Spreadsheets—An Introduction 42 9. Programming in Qbasic Graphics Spreadsheets and Sound 129 Components of Microsoft Excel 2010 Various commands used to draw different shapes Window India Commands to generate sound Basic Operations—Creating, Saving, Exiting, Play music using QBASIC code Opening a Workbook Sample projects Printing, Navigating, Renaming, Adding and Removing a Worksheet Activities and Projects 146 Entering Data in a Worksheet Sample Test Paper 149 Editing—Selecting, Changing, Deleting, Copying,Pearson Moving, Inserting and Deleting Data© in a Worksheet ICSE_E-World 7_Prelim.indd 6 14/02/2017 06:18:57 AM 1 Computer—Hardware Components Ltd The former chairman of IBM Thomas Chapter Focus Watson in 1943 was reported to have said, "I ✓ Data and Information think there is a world market for maybe ✓ Hardware and Software Pvt. FIVE computers!" Today, most of us have ✓ Working of a Computer ✓ External Hardware about fi ve computers with us, in some form ✓ Storage Devices or other including laptops, netbooks, ✓ Internal Hardware cellphones, iPads, tablet PCs and what not! Nowadays, computers are an integral part of our lives. Services A computer system is an electronic device that accepts data as input (through input devices like keyboard and mouse), processes the input data by performing mathematical and logical operations (through the CPU) and gives the desired output (through output devices like monitor and printer). The computer also stores large amounts of data and information either temporarily or permanently in memory devices. The concept of generating output informationEducation from the input data is also referred to as Input-Process-Output (IPO) concept (Fig. 1.1). Data and Information INPUT InstructionsIndia PROCESS OUTPUT Fig. 1.1 IPO concept DATA AND INFORMATION A computer is a data-processing machine. Data refers to the raw facts and fi gures which are processedPearson logically by sets of instructions known as programs. The data is supplied to the computer by input devices. Information, on the other hand, is the logically processed data that is meaningful© and timely. The same data can be processed with different algorithms to cater to different information needs. 1 ICSE_E-World 7.indd 1 14/02/2017 07:40:13 AM For example, the marks submitted by the teachers to the report generation system may be considered as data, whereas the report card that is generated by the system is the information (Fig. 1.2). Data Processing Information Fig. 1.2 Relationship between data and information HARDWARE AND SOFTWARE The computer system has two very important components—hardware and software. Ltd Hardware Memory Unit Hardware refers to the tangible components or the Pvt. machinery that makes up a Central Processing Unit (CPU) computer. Hardware Control Unit (CU) components accept the data Input Device Output Device and instructions, process it Arithmetic and generate the desired and Logic Unit (ALU) outputs. All input, output, Services processing devices, logical Fig. 1.3 Functional units of a computer circuits, chips and so on are examples of hardware. Figure 1.3 shows the basic diagram of the functional units of a computer system. Software Software refers to a collection of programs.Education It is a set of instructions that tells the computer about the tasks to be performed and how these tasks are to be performed. Operating systems, applications, utilities and so on are examples of software. Let us now take a look into theIndia working of a computer. WORKING OF A COMPUTER A computer accepts data, processes data, generates output and stores data. The computer system accepts input through input devices. The input in the form of data and instructions is processed by the Central Processing Unit (CPU). The memory unit stores the data, instructions and intermediatePearson results temporarily or permanently. Finally, the result is generated through the output© unit. We will learn more about hardware in this chapter. Hardware: External and Internal Hardware The hardware of a computer can be external hardware or internal hardware. 2 ICSE_E-World 7.indd 2 14/02/2017 07:40:14 AM Table 1.1 External and Internal Hardware External Hardware Internal Hardware External hardware are the devices that are attached to Internal hardware are the components that are within the computer box into one of the ports of the computer. the computer box. They are built-in, attached or added as expansion cards to the motherboard of the computer. Some of the external hardware components are as Some of the internal hardware components are as follows: follows: • Input devices—Keyboard, Mouse, Light Pen, • Motherboard Barcode Reader, Optical Character Recognition • Power supply (OCR), Magnetic Ink Character Reader (OMR), • Fan Ltd Smart card, Touchscreen, Scanner, Joystick, • Processor Digitising tablet, Web Camera, Digital Camera, • Primary Memory—RAM and ROM Biometric Devices, • Disk drives • Output devices—Monitor, Speaker, Printer, • Ports Pvt. Projector, Plotter, • Storage devices—Compact Disc, Digital Versatile Disc, USB fl ash drive, Modem, Memory card EXTERNAL HARDWARE The external hardware devices are discussed below. ServicesInfo Hub Programs have to be loaded The Input Devices into the main memory fi rst The input devices accepts information from the users. Some of to be executed. Register is a special location within the the popular input devices are listed here. CPU that is used to hold Keyboard: A computer keyboard (Fig. 1.4) is the most common data and addresses required during processing. and standard input device. It is anEducation electromechanical device designed to transmit specialised electronic codes when a key is pressed. Keyboards have standard typewriter keys, function keys, cursor movement keys, numericIndia keys and special purpose keys like Ctrl (Control), Del (Delete), Ins (Insert) and Alt (Alternate). Keyboards are generally wired but nowadays wireless keyboards are also common. Fig. 1.4 Keyboard Mouse: The mouse (Fig. 1.5) is an important input device. A mouse allows control of an on- screen pointer called a cursor, which commonly looks like an arrow. When the arrow is properly Pearsonpositioned, it can be used to perform various tasks by pressing buttons on the © mouse. A mouse is generally an optical mouse. An optical mouse has a small light (usually red) under it and works on the principle of refl ection of light. A wireless mouse is not attached to the computer through a wire. It communicates with the computer using signals. Fig. 1.5 Mouse 3 ICSE_E-World 7.indd 3 14/02/2017 07:40:17 AM Light Pen: Light pen (Fig. 1.6) resembles ordinary pens and is used to indicate locations on a computer screen. There is a light-sensitive detector on the tip of the light pen. The detector identifi es the location of the pen on the screen, when the light pen touches the screen. It is connected to the VDU (Visual Display Unit). There is a light-sensitive detector on the tip of the light pen. The detector identifi es the location of the pen on the screen, where the light pen touches the screen. It is used to draw images on screen and instruct the computer to change the Fig. 1.6 Light pen shape, size, position and colour of sections of a screen. Barcode Reader: A barcode is a pattern printed in lines of different thicknesses that can be seen on many products. A barcode Ltd reader is used to scan the barcode of a product, thereby eliminating chances of any typing errors. It also helps to make Pvt. transactions faster. Figure 1.7(a) shows a barcode reader and Figure 1.7(b) shows (a) Barcode reader (b) Sample barcode a sample barcode. Fig. 1.7 Optical Character Recognition (OCR): An OCR reader (Fig.1.8) is a device that analyses the scanned character,Services recognises it and produces electronic or digital copy. It is widely used to convert books and documents into electronic fi les. Fig. 1.8 OCR reader Optical Mark Recognition (OMR): An OMR is used widely for evaluating multiple-choice questionnaires. The device has a high- intensity light inside that is directed in the form of a beam at the sheets Education of papers being fed through it. The beam scans the number and location of the pencil marks on the sheet of paper. The data is then convertedIndia into signals for the computer. Figure (a) OMR sheet (b) OMR 1.9 shows a part of an OMR sheet. Fig. 1.9 Magnetic Ink Character Recognition (MICR): An MICR (Fig. 1.10) is primarily used for verifying cheques. This recognition can identify and interpret numbers and few special symbols Pearson printed with magnetic ink on a © cheque.
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Virus Infection Techniques: Boot Record Viruses
    Virus Infection Techniques: Boot Record Viruses Bill Harrison CS4440/7440 Malware Analysis and Defense Reading } Start reading Chapter 4 of Szor 2 Virus Infection Techniques } We will survey common locations of virus infections: MBR (Master Boot Record) Boot sector Executable files (*.EXE, *.COM, *.BAT, etc.) } Most of the examples of these viruses, especially the first two types, are from the DOS and floppy disk era 3 Why Study Older Viruses? } Vulnerabilities remain very similar over time, along with the means to exploit them and defend against them } Modern Internet worms differ mainly in the use of the internet for transport, and are otherwise similar to older viruses } Older viruses illustrate the virus vs. antivirus battle over many generations 4 Boot-up Infections and the PC Boot-up Sequence } PC boot-up sequence: 1. BIOS searches for boot device (might be a diskette, hard disk, or CD-ROM) 2. MBR (Master Boot Record) is read into memory from the beginning of the first disk partition; execution proceeds from memory 5 Master Boot Record Structure Boot-up Sequence cont’d. 3. Beginning of MBR has tiny code called the boot- strap loader 4. Data area within MBR has the disk PT (partition table) 5. Boot-strap loader reads PT and finds the active boot partition 6. Boot-strap loader loads the first sector of the active partition into memory and jumps to it; this is called the boot sector 7 Boot-up Sequence cont’d. } MBR is always at BIOS the very first sector of the hard MBR: Expanded View MBR Boot-strap loader code (446 disk (first 512
    [Show full text]
  • IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions
    IBM Security Solutions May 2011 IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions Contents About the report 2 About the Report The IBM X-Force® Threat Insight Quarterly is designed to highlight some of the most significant threats and challenges 3 Evolution: From Nuisance to Weapon facing security professionals today. This report is a product of IBM Managed Security Services and the IBM X-Force 8 Prolific and Impacting Issues of Q1 2011 research and development team. Each issue focuses on specific challenges and provides a recap of the most significant recent 16 References online threats. IBM Managed Security Services are designed to help an organization improve its information security, by outsourcing security operations or supplementing your existing security teams. The IBM protection on-demand platform helps deliver Managed Security Services and the expertise, knowledge and infrastructure an organization needs to secure its information assets from Internet attacks. The X-Force team provides the foundation for a preemptive approach to Internet security. The X-Force team is one of the best-known commercial security research groups in the world. This group of security experts researches and evaluates vulnerabilities and security issues, develops assessment and countermeasure technology for IBM security products, and educates the public about emerging Internet threats. We welcome your feedback. Questions or comments regarding the content of this report should be addressed to [email protected]. 3 X-Force Threat Insight Quarterly IBM Security Solutions Evolution: From Nuisance to Weapon One of the more notable examples here is Brain3, a boot sector infector which originated in Pakistan and released in 1986, was Creeper, Wabbit, Animal, Elk Cloner, Brain, Vienna, Lehigh, one of the first examples of malware that infected PC’s running Stoned, Jerusalem.
    [Show full text]
  • Virus Bulletin, July 91
    July 1991 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason, University of Iceland Editorial Advisors: Jim Bates, Bates Associates, UK, Phil Crewe, Fingerprint, UK, David Ferbrache, ISIS Ltd., UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, RSRE, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE IBM Triumphs Amidst the ‘Vapourware’ 34 EDITORIAL 2 Results Table 35 TECHNICAL NOTES 3 TUTORIAL PRODUCT REVIEWS Fixed Disk Boot Sectors and 1. SafeWord Virus-Safe 36 Post-Attack Recovery 5 2. Knoxcard: Anti-Virus Hardware 38 Virus Bulletin Education, Training & Awareness Presentations 9 3. Trend Micro Devices’ PC-cillin 40 LETTERS SHAREWARE REVIEW VB Signatures With IBM’s Virscan 10 PC Virus Index 42 Vetting Procedure 10 KNOWN IBM PC VIRUSES 12 END-NOTES & NEWS 44 VIRUS BULLETIN ©1991 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers.
    [Show full text]
  • CIAC 2301 Virus Update May 1998
    Department of Energy CIAC UCRL-MA-115896 Rev. 6 Computer Incident Advisory Capability Virus Information Update CIAC-2301 Gizzing H. Khanaka William J. Orvis May 21, 1998 Lawrence Livermore National Laboratory DISCLAIMER This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. This report has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information P.O. Box 62, Oak Ridge, TN 37831 Prices available from (615) 576-8401, FTS 626-8401. Available to the public from the National Technical Information Service U.S. Department of Commerce 5285 Port Royal Rd. Springfield, VA 22161 CIAC is the U.S. Department of Energy’s Computer Incident Advisory Capability. Established in 1989, shortly after the Internet Worm, CIAC provides various computer security services to employees and contractors of the DOE, such as: • Incident Handling consulting • Computer Security Information • On-site Workshops • White-hat Audits CIAC is located at Lawrence Livermore National Laboratory and is a part of its Computer Security Technology Center.
    [Show full text]
  • An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. ii ABSTRACT This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts.
    [Show full text]
  • Compliments of Edited by Linda Mccarthy and Denise Weldon-Siviy
    Compliments of Edited by Linda McCarthy and Denise Weldon-Siviy page press Smart Books for Smart People® The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. All trademarks are the property of their respective owners. Publisher: Linda McCarthy Editor in Chief: Denise Weldon-Siviy Managing Editor: Linda McCarthy Cover designer: Alan Clements Cover artist: Nina Matsumoto Interior artist: Heather Dixon Web design: Eric Tindall and Ngenworks Indexer: Joy Dean Lee Interior design and composition: Kim Scott, Bumpy Design Content distribution: Keith Watson The publisher offers printed discounts on this book when ordered in quantity for bulk purchases, or special sales, which may include electronic versions and/or custom covers and content particular to your business, training, goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Education Sales (510) 220-8865 Except where otherwise noted, content in this publication is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License, available at http://creativecommons.org/licenses/by-sa/3.0/us/legalcode. ISBN 978-0-615-37366-9 Library of Congress Cataloging-in-publication Data McCarthy, Linda Own your space : keep yourself and your stuff safe online / Linda McCarthy. ISBN 978-0-615-37366-9 (electronic) 1. Computer security. 2. Computers and children.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]
  • Twenty Years Before the Mouse
    Twenty years before the mouse. Aryeh Goretsky Distinguished Researcher Table of Contents Introduction 3 Fiat Lux 4 Brain Damage: Rootkits 1980s-Style 4 On-the-Job Training 5 Ransomware: Then and Now 5 War of the Parasites 6 Writing Viruses for Fun and Profit 9 Somebody Set Us Up the Bomb 11 Profits of Doom 12 This Way to the Egress 16 Acknowledgements 17 Sources 18 Title note: With apologies to author Charles Erskine’s “Twenty Years Before the Mast: With the more thrilling scenes and incidents while circumnavigating the globe under the command of the late Admiral Charles Wilkes 1838-1842.” Boston (privately printed), 1890. 2 Twenty years before the mouse Introduction For the past several years, I have been deep in the dark bowels of ESET, LLC’s Research Department—as the department’s Special Projects Manager, working on tasks that are vital at antivirus companies but generally go unnoticed by the public, testing things, making things, aggregating data from disparate sources, providing commentary and analysis and all the other myriad tasks one has to perform as a manager. One such regular responsibility is drafting new research topics alongside security expert Jeff Debrosse, the head of Research at ESET. Jeff is no stranger to visitors of ESET, LLC’s blog or readers of its white papers. He has written many of both and has been involved in the creation of others to varying extents. But as Senior Director, he is not just a frequent author or speaker but responsible for the operation of the department as well. And that means occasionally getting one of us to write a white paper.
    [Show full text]
  • Computer Viruses a Global Persp Ective
    In Proceedings of the th Virus Bulletin International Conference Boston September Virus Bulletin Ltd Abingdon England pp Computer Viruses A Global Persp ective Steve R White Jerey O Kephart and David M Chess High Integrity Computing Lab oratory IBM Thomas J Watson Research Center PO Box Yorktown Heights NY Intro duction Technical accounts of computer viruses usually fo cus on the microscopic details of individual viruses their structure their function the typ e of host programs they infect etc The media tends to fo cus on the so cial implications of isolated scares Such views of the virus problem are useful but limited in scop e One of the missions of IBMs High Integrity Computing Lab oratory is to understand the virus problem from a global p ersp ective and to apply that knowledge to the development of antivirus technology and measures We have employed two complementary approaches observational and theoretical virus epidemiology Observation of a large sample p opulation for six years has given us a go o d understanding of many asp ects of virus prevalence and virus trends while our theoretical work has b olstered this understanding by suggesting some of the mechanisms that govern the b ehavior that we have observed In this pap er we review some of the main ndings of our previous work In brief we show that while thousands of DOS viruses exist to day less than of these have actually b een seen in real virus incidents Viruses do not tend to spread wildly Rather it takes months or years for a virus to b ecome widespread and
    [Show full text]
  • Class -VII Super Computer Exercise Corner Specimen Copy Year- 2020-21
    s Class -VII Super Computer Exercise Corner Specimen Copy Year- 2020-21 Page 1 CH-9 Computer Security Focus of the chapter 1. Computer Virus 2. Symptoms of virus 3. Types of virus 4. Other harmful programs 5. Antivirus software Keywords Virus – a program designed to perform undesired and malicious actions. Spam –Unsolicited and unwanted email Trojan Horse – a harmful program that damages the computer once it runs. Quarantining – isolation of a file by antivirus software Checkpoint Fill in the blanks. 1. The term Malware is formed by the combination of the words – malicious and software. 2. A virus can infect the files in your computer. 3. Elk Cloner, Brain, Disk killer and stoned virus are types of boot sector viruses. 4. A file infector virus infects program and executable files. 5. Spam refers to unsolicited and unwanted email. 6. Elkern, Marburg, Satan Bug and Tuareg are examples of Polymorphic viruses Page 2 Checkpoint A. Match the columns. 1 Trojan Horse a runs in the background of another file. 2 Worm b An Advertising Supported software 3 Backdoor virus c Although safe, but damages the system once it runs 4 Spyware d Can multiply itself over a network 5 Adware e Collects information about the Internet surfing habits of the user Ans. 1 – c 2 – d 3 – a 4 – e 5 - b B. Fill in the blanks. 1. Quarantining a file is the first action performed by an antivirus software. 2. In repairing method, the antivirus removes the virus code and repairs the file. 3. Repairing a file is the best method to remove a virus code and restore the file to its original form.
    [Show full text]