The operating system within any computer is the most important software because it is the software that provides the computer with the interface to inter act with the outside world. Specifically speaking what it does is that it connects the computer with the hardware, the mouse,…
The operating system basically creates an environment in which the application programs can function. Operating system deals with the program execution i.e. loading the program to memory, executing the program and ending or terminating the program. It helps with the identification of errors such as traffic errors or shortage or memory. Operating systems are involved in allocation of resources within the different computer programs according to their need levels and subject to availability of memory and other resources. Input and output functions regarding different files and devices are also performed by the operating system. Some other functions that the operating system performs are file management, the renaming of files and storage are looked at in this section; security is another core aspect of operating systems, its provides protection to programs and different data; accounting is another aspect that is handled by the operating system, in this basically it maintains a record of the resources that have been used by different ...
Cite this document
(“What are computer viruses Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/400350-what-are-computer-viruses
(What Are Computer Viruses Essay Example | Topics and Well Written Essays - 500 Words)
“What Are Computer Viruses Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.net/miscellaneous/400350-what-are-computer-viruses.
The following are the major, recent computer security threats: Blended threats This refers to a combination of spyware and malware attacks on a computer. This is the major current threat, where the attackers are blending malware software with spyware software and sending them to individual emails or chat rooms in form of a URL link (Trend Micro, 2008).
This is a report about malware that specifically reflects on the problems that was faced due to the malware that attacked our computer system. This report closely looks at the malware one by one concentrating specifically on the problems that they caused in a time frame of twenty four hours.
Furthermore, this was frustrating to my fellow group members given that we had spent a lot of time and commitment in order to complete the assignment. According to findings obtained from re-examination assumptions, the computer may have crashed due to infection by malicious viruses, which are designed to destroy valuable or bring a system to a halt (Ludwig, 1996).
Most of them are using a computer in some way and are almost constantly connected to the web. This consistent connection fosters a risk. The risk is a worm or a virus collected along the way. This paper will discuss risk for the home worker and for the company connected to the net.
Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations. However, the studies differ in the study goals and scope, methodology and analysis.
The importance of computer security has been emphasized by two expert studies.
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
Then, it proceeds to introduce the field of computer forensics, and the tools and technology that are used in this field for fighting Internet crimes. The paper finishes the discussion by enumerating applicable laws and notable contributions of computer forensics.
In addition, viruses can be a mechanism for evolution. When viruses inject their genetic material into a host cell, the genes are integrated into the genome structure of the organism. Depending on whether the host cell enters the
Additionally, the rise of computer crime is attributed to inexistence of laws related to computer crime (Fisch & White, 1999).
Computer crime is not always associated with physical damage of property. The constituents are
First, I discovered that I was a bit careless with storage of my personal computer which is portable since I often leave it on top of the table when out of the house and whenever I carry it around or when travelling I normally left
1 Pages(250 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic What are computer viruses for FREE!