STAMFORD UNIVERSITY BANGLADESH Assignment on Public Speaking Assignment topic : Informative speech on “Computer Viruses” Submitted to : Kanita Ridwana Lecturer Department of English Stamford University Bangladesh. Submitted by : Mir Alim – uz – zaman
Premium Computer Microsoft Word Application software
Introduction to Computer Viruses It’s Saturday morning. You boot up your Windows 98 computer and lo and behold‚ the graphics on the desktop are a mirror image of what they should be. Congratulations‚ you have a computer virus! According to "Virus Bulletin‚" the Oxfordshire‚ England-based technical journal that tracks viruses‚ this new virus flips any uncompressed bitmaps horizontally‚ but only on Saturdays. This bulletin credits GriYo of the 29A virus-writing group as the author of this 32-bit
Premium Computer virus
COMPUTER VIRUS AND ITS TYPES COMPUTER VIRUS Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system. DETAIL ABOUT COMPUTER VIRUS They are replicated by themselves. Viruses are so dangerous and malicious that they can be automatically copied and pasted from memory to memory over and over; the transmitting power is too much quick from network to network that can simply hang smoothly running
Premium Computer virus
INTRODUCTION Technology and Livelihood Education (TLE) is one of the nomenclatures in the implementation of the K to 12 Basic Education Program (BEP) consisting of four components‚ namely: Agri-Fishery Arts (AFA)‚ Home Economics (HE)‚ Industrial Arts (IA)-0 and Information and Communication Technology (ICT). In this module‚ the focus is on an ICT mini-course – PHOTO EDITING. Now that the workforce lags behind in increasing the number of available jobs‚ the Department of Education is revitalizing
Premium Computer graphics
that Computer Hacking is something we don’t ever hear about? Hundreds of Hackers every day break into banks and businesses and steal valuable information or even money from people such as ourselves. They are other hackers that start viruses and worms through big computer networks that can destroy all your information you have and your computer. Hackers use everyday things to start computer eaters‚ which is why we have those annoying viruses and worms everywhere in computers. We use anti-viruses software
Premium Hacker .hack Credit card
following report‚ "computer viruses" will be explained in detail. A lengthy and informative description of the evolution and history on microcomputer viruses will be given‚ to give you a background of their origin for some understanding of how they came to be. The next segment in the report is on how to combat computer viruses with the development of anti-virus applications. The current status of microcomputer viruses will also be discussed‚ naming the most common types of viruses and the most harmful
Premium Microsoft Office Computer virus
Differences between Viruses‚ worms‚ and Trojan Horses Computer viruses are man-made program or a piece of code which can load onto your computer without your knowledge and cause damage to your computer system. The dangerous part of the computer viruses is they are attached to a file or program‚ which means the computer viruses will not running until you click the file or program‚ and even more dangerous type of viruses is one capable of transmitting itself across networks and bypassing security
Premium Computer virus Malware Antivirus software
Computer Malware Computers have become a part of many people’s everyday life and most families own at least one computer at home. Although computers have brought many conveniences to a person’s daily life‚ there are people out there that have bad intentions such as stealing other people’s private data. Through these intentions‚ these people have made many softwares to achieve their goals. These softwares are called “Malware” and they have the ability to corrupt a computer’s system and cause
Premium Malware Computer virus
Computer Security Student Name University Abstract James works for a bank‚ and he spends most of his attending to bank clients and travelling. He always carries with him a laptop that contains confidential bank information. The Operating System of the laptop was last updated in May 2011. Some of the programs James uses are MS word 2007‚ MS Access and MS Excel. James’ computer is‚ however‚ not well secured. It does not have a firewall or an antivirus. In addition‚ the data in the laptop are
Premium Computer security Computer Personal computer
Computer Crime This type of crime is the illegal exploitation of computer technologies‚ usually involving the Internet‚ to support crimes such as fraud‚ identity theft‚ sharing of information‚ and embezzlement. Exactly what is illegal varies greatly from state to state. Consequently‚ the growth of international data communications and in particular the Internet has made these crimes both more common and more difficult to police. Luckily there are people fighting computer crime and it is taken very
Premium Computer security Antivirus software Computer virus