Unit 5 Computer Viruses
Unit 5 Computer Viruses
Unit 5 Computer Viruses
COMPUTER VIRUSES
Task 1 Study this diagram which explains how one type of virus operates.
Try to answer these questions.
Uninfected Infected
program program
ORIGINAL
Starting instruction
JUMP
Instruction
Task 2 Scan this text to check your answers. Ignore any parts which do
not help you with this task.
A biological virus is a very small, simple organism that infects living cells, known
as the host, by attaching itself to them and using them to reproduce itself. This often
causes harm to the host cells.
Similarly, a computer virus is a very small program routine that infects a computer
system and uses its resources to reproduce itself. It often does this by patching the
operating system to enable it to detect program files, such as COM or EXE files. It then
copies itself into those files. This sometimes causes harm to the host computer system.
When the user runs an infected program, it is loaded into memory carrying the
virus. The virus uses a common programming technique to stay resident in memory. It
can then use a reproduction routine to infect other programs. This process continues
until the computer is switched off.
The virus may also contain a payload that remains dormant until a trigger event
activates it, such as the user pressing a particular key. The payload can have a variety
of forms. It might do something relatively harmless such as displaying a message on
the monitor screen or it might do something more destructive such as deleting files on
the hard disk.
When it infects a file, the virus replaces the first instruction in the host program with
a command that changes the normal execution sequence. This type of command is
known as a JUMP command and causes the virus instructions to be executed before
the host program. The virus then returns control to the host program which then
continues with its normal sequence of instructions and is executed in the normal way.
To be a virus, a program only needs to have a reproduction routine that enables it
to infect other programs. Viruses can, however, have four main parts. A misdirection
routine that enables it to hide itself; a reproduction routine that allows it to copy itself to
other programs; a trigger that causes the payload to be activated at a particular time or
when a particular event takes place; and a payload that may be a fairly harmless joke
or may be very destructive. A program that has a payload but does not have a
reproduction routine is known as a Trojan.
·
Task 3 Now read the whole text to find the answers to these questions.
Routine Function
1. misdirection a. does the damage
2. reproduction b. attaches a copy of itself to another program
3. trigger c. hides the presence of the code
4. payload d. decides when and how to activate the payload
1. MIDI message makes sound into code as 8-bit bytes of digital information.
2. The teacher is using a new program to give courage to children to write
stories.
3. The new version of Sim City has been made better in many ways.
4. A gateway makes it possible for dissimilar networks to communicate.
5. You can convert data to secret code to make it secure.
6. Make sure the machine is disconnected before you remove the case.
7. Designers can offer good ideas for making your website brighter.
8. Electronic readers allow you to make the print size larger.
9. Programmers write software which makes the computer able to carry out
particular tasks.
10. You can make the picture on your monitor wider.
Task 6 Decide in your group what these kinds of computer crime are. Then
match the crimes to the short descriptions which follow.
1. Logic bomb
2. Denial of Service attack
3. Trojan Horse
4. Trapdoors
5. Mail bombing
6. Software Piracy
7. Piggybacking
8. Spoofing
9. Defacing
10. Hijacking
Task 10 Decide on the relationship between these events. Then link them
using structures from this and earlier units.
1. Anti-virus program
a. A user runs anti-virus software.
b. The software checks files for virus coding.
c. Coding is matched to a known virus in a virus database.
d. A message is displayed to the user that a virus has been found.
e. The user removes the virus or deletes the infected file.
f. The virus cannot spread or cause further damage.
2. Face recognition
a. You approach a high-security network.
b. Key features of your face are scanned.
c. The system matches your features to a database record of authorised
staff.
d. Your identity is verified.
e. You can log on.
f. Your identity is not verified.
g. You cannot use the system.
3. Voice recognition
a. Computers without keyboards will become more common.
b. These computers are voice-activated.
c. The user wants to log on.
d. She speaks to the computer.
e. It matches her voice to a database of voice patterns.
f. The user has a cold or sore throat.
g. She can use the system.
h. Stress and intonation patterns remain the same.
Task 11 Match the words and definitions listed below.
Task 12 Read this news report and discuss the questions that follow.
Task 2 Read the text and match the headings (or subtitles) with each
paragraph.
VIRTUAL MEETINGS
………………………………………
Imagine,~ you want to assemble
·.
a group of people from around the world for a
brainstorming session. Conferencing programs such as NetMeeting or CUSeeMe allow
virtual workgroups to communicate via the Internet. To videoconference, you'll need a
webcam. Participants sentence each other's faces in small windows on their monitors
and hear each other's voices on the computer speaker. You can use just audio, video
and audio simultaneously, or the screen-sharing capability to collaborate on documents
without audio or video.
……………………………………..
Internet telephony, also known as VoIP (Voice over Internet Protocol), almost
eliminates long-distance phone charges, allowing you to call nearly anywhere in the
word for the price of a local call. If you have flat-rate internet access, you can’t beat the
price – it’s practically free.
With internet telephony, you can make a voice call from your computer to another
person's computer, landline, or mobile phone. You can download telephony software
such as Skype or Net2Phone from the Net, and it's even free!
……………………………………..
People also use more traditional chat conferencing or bulletin board systems
(BBSs) to communicate online. Note that during chat sessions, participants type
messages to each other rather than communicate by voice. Chat software can be
used on the Web with your browser to conduct online chat sessions with other
users and can accommodate between 50 and 1,000 users simultaneously. Some
companies even use chat conferencing on their websites to facilitate communication
with customers
…………………………………………..
Chat rooms can be good venues to meet people and discuss topics of mutual
interest. But what if you want to chat privately with a friend, family member or business
colleague? Then Instant Messaging, or IM, is the way to go. Many IM services now
offer audio and video capabilities, so if you have a microphone and a webcam, you can
chat and sentence who you're talking to. The four most popular IM services are ICQ
and AIM (from AOL), Windows Live Messenger, and Yahoo! Messenger. They all work
similarly. First, you enroll in the service by creating a username - which is also your
screen name - and a password. Next, you build what is known as a buddy list - a list of
people that you want to communicate with. When any of the contacts on your list is
online, you can start a private chat with that person.
How do you know who's online? When you launch your IM software, it connects
with the service's IM server and logs you on. The server checks your buddy list to
sentence if any of your contacts are also logged on. Your list updates to show who is
currently online. By clicking on a name you can send text-based messages to that
person. After you type your note and click on the Send button, the message travels to
the IM server, then immediately forwards to your buddy's computer. This all happens in
real time-instantly.
…………………………
You can also chat in incredible 3-D worlds that are built by other users, for
example Second Life. In these virtual reality environments you can play 3-D games
and interact with other users via avatar identities Avatars are 3-D graphical
representations of the participants.
1. at a fixed price
2. a central system that provides information about whether, users are online
and passes instant messages between them
3. a friend list or contact list
4. happening immediately and without delay
5. artificial reality; a 3-D space generated by the computer
6. characters used when interacting with people on line
Task 5 Do this netiquette quiz.
Task 6 Netiquette
1/ Rewrite this IM chat, using full forms instead of abbreviations.
Task 8 Analyze these sentences (Kinds of sentences & clauses & phrases).
1. Participants
,~ sentence each·.
other's faces in small windows on their monitors
and hear each other's voices on the computer speaker.
2. Internet telephony, also known as VoIP (Voice over Internet Protocol), almost
eliminates long-distance phone charges, allowing you to call nearly anywhere
in the word for the price of a local call.
3. You can download telephony software such as Skype or Net2Phone from the
Net, and it's even free!
4. Many IM services now offer audio and video capabilities, so if you have a
microphone and a webcam, you can chat and sentence who you're talking
to.
5. By clicking on a name you can send text-based messages to that person.
6. After you type your note and click on the Send button, the message travels to
the IM server, then immediately forwards to your buddy's computer.
7. You can use just audio, video and audio simultaneously, or the screen-sharing
capability to collaborate on documents without audio or video.
8. First, you enroll in the service by creating a username - which is also your
screen name - and a password.
9. When any of the contacts on your list is online, you can start a private chat
with that person.
Task 9 Think about the advantages of video conference then read the
brief text below to check your opinion.
Video conferencing is a simple and cost-effective way to keep in touch with your staff,
customers and partners. You can have meetings with people in two or more locations through
a video link while saving a considerable amount of money in travel and accommodation
expenses. In addition to traditional meetings, a high-quality video link can be used for
internal and external communications, consultation, remote training, help desking and other
support operations as well as sales meetings.
Task 1 Look at the computer graphics (a-d) and discuss these questions.
COMPUTER GRAPHICS
Computer graphics are pictures and drawings produced by computer. There are
two main categories:
Raster graphics, or bitmaps, are stored as a collection of pixels. The sharpness of
an image depends on the density of pixels, or resolution. For example, text or pictures
that are scaled up - that is, made bigger - may show jagged edges. Paint and photo-
editing programs like Adobe Photoshop focus on the manipulation of bitmaps. Popular
raster formats are JPEG, GIF and TIFF.
Vector graphics represent images through the use of geometric objects, such as
lines, curves and polygon, based on mathematical equations. They can be changed or
scaled without losing quality. Vector data can be handled by drawing programs like
Adobe Illustrator, Corel Draw or Macromedia Freehand. EPS is the most popular file
format for exchanging vector drawings.
Almost all computer users use some form of graphics. Home users and
professional artists use image-editing programs to manipulate images. For example,
you can add filters (special effects) to your favourite photos, or you can composite
images. Compositing is combining parts of different images to create a single image.
Graphics artists and designers use drawing programs to create freehand drawing
and illustrations for books or for the Web. Business people use presentation graphics
to make information more interesting visually - graphs and diagrams can be more
effective ways of communicating with clients than lists of figures. Electrical engineers
use graphics to design circuits in order to present data in a more understandable
form. Mechanical engineers use CAD (Computer Aided Design) software to develop,
model and test car designs before the actual parts are made. This can save a lot of
time and money.
CAD is also used in the aerospace, architecture and industrial sectors to
design everything from aeroplanes and buildings to consumer products. Designers
start a project by making a wireframe, a representation showing the outlines of all
edges in a transparent drawing. They then specify and fill the surfaces to give the
appearance of a 3-D solid object with volume. This is known as solid modelling. Next,
they add paint, colour and filters to achieve the desired ‘look and feel’: this is called
texturing the object. Finally, they render the object to make it look real. Rendering
includes lighting and shading as well as effects that simulate shadows and reflections.
Computer art, or digital art, is used in adverts and TV programmes. Artists and
scientists use special graphic applets to create amazing fractals. Fractals are
geometrical patterns that are repeated at small scales to generate irregular shapes,
some of which describe objects from shapes. Government agencies use GIS
(Geographic Information Systems) to understand geographic data and then plan the
use of land or predict natural disasters. Cartographers use GIS to rnake detailed
maps. Animators use computer animation software to create animated cartoons or
add effects in movies and video games.
1. What are the differences between raster graphics and vector graphics?
2. Which graphics file formats are mentioned?
3. What is compositing? .
4. What does CAD stand for?
5. What are the benefits of using graphics in the car industry?
6. What type of graphics software is used to make maps or models of the Earth?
7. Who uses computer animation? How?
Task 4 Match the words (1-6) with the definitions (a-f).
1. Computer animation is the process of create objects which move across the
screen.
2. Texturing involves add print, colour and filters to drawings and designs.
3. You can open the colour palette by click on the corresponding icon.
4. CAD programs are very fast at to perform drawing functions.
5. A lot of time and money is saved by test a car design before to make the
product.
6. To render refers to the techniques used to make realistic images.
Task 6 Student A chooses task from the list (1-6) and describes it.
Student B chooses the most appropriate graphics software for
the task (a-t) and gives reasons for his or her choice.
1. to edit and retouch photos
2. to create illustrations and drawings for a magazine
3. to prepare slideshows for training sessions or conferences
4. to make mechanical designs and architectural plans
5. to create dynamic simulations and special effects for films, TV,
advertisements and games
6. to analyse geographic data and make maps
Task 7 Before reading the text below, try to answer these questions.
1. How many distinct shades of colour can the human eye see?
2. What is:
a. a pixel?
b. a bit?
c. a byte?
d. a greyscale display?
3. Roughly how many different colour shades can be generated from 24-bit
colour?
4. If your machine has 24-bit colour and a one million-pixel display, how much
memory will you need to drive the screen?
24-BIT COLOUR
Short explanation:
If your computer has 24-bit colour, then it can display photographic images in colour
on its screen that have natural-looking tones.
Long, long explanation:
In principle, there is an infinite number of shades available between a solid colour
and pure white. In practice, the human eye can detect somewhere between 150-200
distinct shades, so as long as you've got more than this, you can produce an
undetectably smooth progression of shades (there are exceptions, but they’re not
worth going into here).
A computer builds up a picture from a series of building blocks called pixels. Each
pixel is a square (normally) of a single colour. The more pixels you can divide the
picture into, the higher the resolution of the complete image. The computer organizes
itself by describing each pixel that it wants to display as a code in the binary
mathematical set (numbers built up from a series of 0s or 1s). Each 0 or l is called a
bit.
Computers are generally structured to work in groups of eight bits (called a byte).
These eight numbers can be used to count up to 256, and so can describe 256
shades of grey from black to white, which is more than enough to satisfy the eye.
A computer which can assign eight bits to describe each pixel will produce perfect
black and white photographs on its monitor. A monitor that can show all these shades
is called a greyscale display.
Now your eye can detect those 150-200 shades in all three of the colours it can
see: red, green, and blue. If you use eight bits to describe colour, you only get 256
colours, which isn't enough.
To get the full colour photographic effect on a computer monitor, you need to be
able to generate 256 shades for each colour. This takes eight bits of information per
colour, giving a total of 24 bits. This is the 24-bit colour that you keep reading about in
computer magazines. If you take all the possible variations of 256 shades of three
colours, you end up with a possible 16. 7 million colour shades.
You only really need 24-bit colour if you are going to do colour photographic
retouching on-screen or similar 'painting' on-screen. For linework and picture placing,
an 8-bit colour monitor is perfectly adequate, as you can still define colours for print
even if you can't show them on the screen.
Naturally, there's a bottom line in all this, or everyone would be using 24-bit colour.
To start with, you need special circuit boards which plug into your computer and
drive the monitor.
A typical high resolution colour monitor can display about a million pixels. The 24
bits that your computer uses to describe each pixel can also be described as three
bytes. To describe a million pixels takes three million bytes. In other words, a hefty
three megabytes of your computer's memory is assigned to driving the screen. With 8-
bit colour, you only need one Mb.
Generally, 24-bit colour boards include extra memory and processors to speed up
the display performance.
Task 8 Decide whether the following statements true (T) or false (F) in
relation to the information in the text. If you think a statement
is false, change it to make it true.
1. If a computer can generate more than 200 distinct shades of colour, the human
eye will see a perfectly smooth progression of shades.
2. Everybody should have a computer that can show true shades on its screen.
3. A group of eight binary numbers is called a byte.
4. Under certain circumstances, 8-bit colour can provide more than 256 colours.
5. To run 24-bit colour, you need three times as much memory to drive the screen
as you do to run 8-bit-colour.
Task 9 Use the information in the text to complete the dialogue in your own
words.
A. -----------------------------------------------------------------------
B. Yes, I’d like to find out a little about 24-bit colour.
A. -----------------------------------------------------------------------
B. Well, first of all, I’d like to know what sort of quality it will give me on my
monitor.
A. ------------------------------------------------------------------------
B. As many as that? What add-ons do I need?
A. ------------------------------------------------------------------------
B. How much memory will I need to drive the screen?
A. ------------------------------------------------------------------------
B. It’s a high-resolution screen.
A. ------------------------------------------------------------------------
B. That’s a lot! I use colour mainly for linework and picture-placing. Do you think
it’s worth buying 24-bit colour?
A. ------------------------------------------------------------------------
UNIT 8
S
DESTOP PUBLISHING r
Task 5 Look at this extract from an online tutorial for DTP publishing.
Put the steps in the creation of a DTP document (a-f) into the
correct order.
a, First, the DTP designers decide the basic form of the document (the type of
document, general design, colour, fonts, images required, etc.).
b. The last step is to take the files to a service bureau, which will print the
publication.
c. To create the DTP document, the designer begins by selecting a template or
by specifying the settings of a new document (the page size, margins,
columns, paragraph styles, master pages, etc.).
d. When the text has been edited, the designer imports the pictures and uses
precise tools to position, scale, crop and rotate all the items.
e. The next step is to type the text directly or to import it from a word processing
program like Word or WordPerfect.
f. Once the file is composed and saved, the designer has to prepare it for printing,
which involves verifying the colour specification, creating a Postscript or PDF
file, exporting the file in HTML format for the Web, checking proofs, etc.
Task 6 Look at this web extract about e-publishing. What examples of e-
publishing can you find in the text?
Publishing has existed in its current form for centuries. Ever since paper was first
invented, human beings have found ways of using it to pass on messages to each other.
Books, magazines and newspapers are now part of our everyday lives, but with the
invention of the Internet and the speed of new technological advances, the world of
publishing is changing. Online newspapers and magazines, biogs, and even e-book readers
are changing the way we get information. But will we ever stop picking up a good old-
fashioned newspaper?
E-publishing versus paper publishing - who will win?
1. a national newspaper
2. a textbook on information technology
3. a laser printer manual
4. Shakespeare's plays
5. a detective story
6. a traveller's guide to India
7. schoolbooks
8. an encyclopedia
1. working at a distance
2. a system of numbers with 2 as its base
3. a way of communicating between a user and a computer
4. 1048576 bytes of information
5. describes a program which allows two way communication between user and
computer
6. set of computer instructions operating as one unit
7. having many different modes of input
8. a computer higher in scale than any other
9. a machine which provides cash to bank customers without requiring a human
operator
10. a very small but powerful processor
11. a system used by many people
12. a word processing feature which corrects by itself
1. Players let you group songs into playlists and make the selection random.
2. lf you adopt differential backup, this reduces to a minimum the size of your
backup set.
3. Most hotels use systems which have been converted for computers.
4. Software developers can produce solutions which are tailored to the customer.
5. Some software houses produce specially written applications.
6. Utilities can be put into categories as editors, filters or communications
programs.
7. You can protect data by putting it in a form only users with authority can
understand.
8. It ls an offence to make copies of software which are done without authority.