Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






Information Retrieval

Information retrieval is the use of the computer as a library. Large amounts of information may be stored in the computer and later searched for and retrieved. In general, only authorized personnel can enter or change the information, but many other people can retrieve and use the information.

A number of commercial information retrieval services are available to individuals. CompuServe, and The Source are services for world news, stock market prices, and many other types of information.

 

Data-Base Management

More complex than information retrieval is the maintenance of data bases. A data base is a collection of information that is not only frequently retrieved, but also changed by a number of people. A very flexible kind of data base is the relational data base, in which the information is organized into categories and stored with attributes, such as a person’s name, age, address, sex, or color of eyes. Using this information a search could be done for all persons.

Data bases are used in banking to store information about the people who have accounts in the bank and the current status of their accounts. Data bases are used in businesses to store payroll and other personnel data, to store general accounting data such as lists of creditors and debtors, to keep track of inventory, to maintain mailing lists, and to provide executives with information for making business decisions.

In business it is recognized as useful to have one large collection of all data that is maintained by a data-base management system. All transactions are handled by this program.

 

Word Processing

 

Word processing is the application of computers to improve the production of written information. This includes correspondence, memos, reports, tables of numeric figures, articles, books, etc. The computer allows one to produce written information faster and easier than with a typewriter or by hand.

The computer has advantages for a number of reasons. First, when a document is written for the first time, it is not written directly to paper. This is advantageous for two reasons: typing errors are easily corrected, and entry is faster.

The second advantage is that revision of the document is easier and faster. After the complete document is typed into memory and stored on a computer diskette, you may read it and make changes easily.

The third advantage is that the final document may be printed out very quickly on a printer connected to the microcomputer. In fact, multiple originals of the document may be printed out just as easily. As long as the document is also stored, you can later make changes.

 

Read the texts. Comment on their contents.

 

Network Viruses

 

Network viruses make extensive use of networking protocols and capabilities of local and global access networks to multiply. The main operating principle of the network virus is its capability to transfer its code to a remote server or workstation on its own.



 

It is wrong to think that any viruses spreading across a computer network is a network virus. In that case virtually all the viruses are to be considered as network-viruses, even the most primitive ones: a usual nonresident virus when infecting files obviously can not tell whether it is as a local drive or on a network drive. And a result such a virus is able to infect within a network, but it cannot be referred to as a network virus.

 

Network viruses of the late 1980s became most popular, sometimes they are called network worms. These are the Morris virus, “Christmas Tree” and “Wank Worm” viruses. They made use of erratic and undocumented functions of global access networks of the time to propagate; viruses transferred copies of themselves from one network server to another and started their execution. In case of the Morris virus multiple global access networks in the U.S. fell victim to it.

 

Network viruses of the past spread themselves across a computer network, and as a rule, like companion viruses, did not change files or sectors on disks. They infiltrated computer memory from network, calculated network addresses of other computers and sent copies of themselves to those addresses. These viruses also sometimes created temporary files on system disks, but were not able to touch computer resources at all (excluding RAM).

 

The problem of network viruses rose once again only in late 1997 with the appearance of “Macro.Word.ShareFun” and “Win. Homer” viruses. The first one utilizes MS Mail’s capabilities – it creates a new message containing document file, then selects 3 random addresses from MS Mail addressee list and sends infected letters to the selected addresses.

 

This virus is an illustration of the first type of a modern network virus, combining the usage of the Basic language built into Word/Excel, with e-mail protocols and features, with auto start functions necessary to spread the virus further.

 

There is a large number of combinations – for example file-boot viruses infecting both files and boot sectors on disks. As a rule these viruses have rather complicated algorithms of work, often use unusual methods of intrusion into the system.

 

The target operating system (namely the OS specific objects prone to attack) is the second level of division of viruses into classes. Each file or network virus infects files of one particular or several OS – DOS, OS/2 etc. Macro viruses infect the Word, Excel etc. Boot viruses are also format oriented, each attacking one particular format of system data in boot sectors of disks.

 

On their destructive capabilities viruses can be divided as follows:

- harmless, that is having no effect on computing (except for some lowering of free disk space as a result of propagation);

- not dangerous, limiting their effect to lowering of free disk space and a few graphical, sound or other FX);

- dangerous viruses, which may seriously disrupt the computer’s work;

- very dangerous, the operating algorithms of which intentionally contain routines which may lead to losing data, data destruction, erasure of vital information in system areas, and even according to one of the unconfirmed computer legends inflict damage to the moving mechanical parts.

 

But even if no destructive branches can be found in the algorithm of a virus, one cannot be perfectly sure that this virus is harmless, because its infiltration into a computer may prove to be unpredictable and sometimes have catastrophic consequences. This is due to the fact that any virus like any program may contain errors, which may damage both files and disk sectors (for example, seemingly harmless “DenZuk” virus works rather correctly with 360K diskettes but can destroy information on high-capacity diskettes. There still are viruses which determine whether the file is COM or EXE not according to the internal structure of the file but according to its extension. And of course if the format of the file does not match the file extension, this file becomes unusable after it has been infected.

 


Date: 2015-12-11; view: 664


<== previous page | next page ==>
Read the text. Distinguish operating systems, programming languages and application programs, define software. | Trojan Horses (Logical Bombs)
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.008 sec.)