Wednesday, July 31, 2019

Circuit City Essay

1). Which of the three approaches to accounting for extended warranty and service contracts is most consistent with the actual substance of a sales transaction involving equipment and an extended warranty contract? Approach number one, the Full revenue recognition is the most consistent due to the reasons which are demonstrated on exhibit two according to the Financial Accounting concept No.5. As stated in this exhibit, Revenues must be both realized and earned prior to the recognition. In this case, after selling the goods and services Circuit city at that point of sale both revenue and earnings have been realized because goods have exchanged hands. At this point of time, even though the cost services haven’t been used, there is a clear agreement and assurance that the necessary services will be rendered during the period of the warranty Further in exhibit 2 it states four key components which justifies that the Full Revenue Approach is the best match of the sale of product a nd extended warranty because at the time of sale an entity will be considered to have substantially completed the earning process if: 1). It incurs the selling cost 2). It has established service network, which is there for the most part to provide the customers with the service associated with the manufacturer’s warranty. 3). Relatively few customers call for service during the extended period 4). Estimates can be made with relative certainty as to future costs to be incurred under the extended warranty. Under these facts, Circuit city had met all the qualifications to report their revenues as they did. The system was in place and the reporting of revenues didn’t seem to have any discrepancies. The information users (Share holders) seem to be happy with the results. Concurrently the profitability of the company as a whole appears to be fully maximized. 2).Why is this revenue reporting strategy is an issue to Circuit stores Inc? There is couple of reasons why senior vice president Michael Chalifoux is concerned: 1). He is concerned because if the proposed accounting reporting method goes to effect, there will be a delay on full rec ognition of revenue and income until the exhaustion of the warranty which will result lower income reported. Lower revenue reports do not reflect well on businesses especially when they had previously shown signs of growth. The reasons might be understood internally, but not externally. 2). Vice president is also concerned about the negative impact  on shareholder’s equity which would be significant in the merchandising industry. By showing low revenue earnings, some of the big companies who act as suppliers might be hesitant to do business with Circuit City because the chain might not be able to move their product as fast they anticipated. Such a change will cause a major loss of revenue which might cause the chain to gout of business. 3). If the company starts to show low income earnings, that change might cause second thought for the investors. Such suspicions cause investors not to invest in the business with confidence. Such a shift drives the stock market prices which may force the company to sell its shares at a lower cost. 3). What would be the effects on Circuit City stores financial statements if FASB requires them to change accounting for extended warranty and product maintenance contracts? 1). There will be definitely a change on reported revenue which is going to be lower that if the company had continued to report as previously. The change might cause a shake up within the company accounting department and the share holders, however it is my strong feeling that things will level out eventually. Even though sometimes change is difficult, Michael Chalifoux needs to have a very clear communication with the shareholders and the internal associates so they know what impact will the change bring. 4).What would Michael Chalifoux do? If the strategies of reporting are in place and there is no bleach of financial reporting in any way, shape or form, Michael does not have to change and adopt the new proposed reporting strategy. On the other side, if Circuit city is under the direction of FASB as a business entity, it is subject to the rules and regulations thereof. If it comes down to that FASB requires the reporting system to be changes, the vice president should do as proposed. In the long run it will be beneficial for the company public image. If the company goes to approach #2 which is full deferral of revenue, it will take couple years and things will level back again.

Francis Turbine Conclusion

FFRANCIS TURBINE QUESTIONS & DISCUSSIONS 7. 1 QUESTIONS 1. Plot a graph of: a. Turbine velocity versus flow rate. b. Turbine velocity versus output torque. c. Turbine velocity versus hydraulic power. d. Turbine velocity versus mechanical power. e. Turbine velocity versus efficiency. 2. Give your comment(s) from the graph obtained. ? Based on the graph Turbine velocity versus flow rate, it is shown that line for both z=50% and 100%is increasing when turbine velocity increase, flow rate also increasing. From the graph Turbin velocity versus output torque, it is shown that output torque for the both line will increase slightly when turbine velocity is increase ? In the Turbin velocity versus hydraulic power graph,the line shows water speed is increasing due to increasing of hydraulic power. Overall, when turbine velocity become large then it will increase hydraulic power. ? Graph of Turbin velocity versus mechanical power shows mechanical power increase when turbine velocity is going do wn. ? For the graph of Turbin velocity versus efficiency, it shows its efficiency decrease when turbine elocity increase. 3. State five (5) safety factors that have been taken in the experiment. There is five safety factors that should be taken while doing the experiment in laboratory: ? Make sure our hands are dry when switch on the switch of the machine ? Make sure the turbine is not stopped immediately as it tends to overspeed with emergency stops. ? Make sure the equipment function well before experiment get started. ? Must follow procedure going on the experiment so accident could be avoid during experiment. ? Make sure handling well the equipments during experiment and void silly behavior.DISCUSSIONS Francis turbine is a type of water turbine that was developed by James B. Francis. It is an inward flow reaction turbine that combines radial and axial flow concepts. Francis turbines are the most common water turbine in use today. They operate in a head range of ten meters to sev eral hundred meters and are primarily used for electrical power production. In real life, the basic operating system of the Francis Turbine is applied to generate hydroelectric power. To design the most efficiency hydroelectric generator, several factors -head, low rate, velocity, power and efficiency of the area should be taking into account. Hman is the differences of pressure head position which measured the pressure and the turbine shaft bar. It is a kinetic parameter which cause by water velocity. The height differences between the pressure gauging point position and the point of water level at the outflow of reservoir will influence the power of outlet. Lower river flows because of drought, climate change or upstream dams and diversions will reduce the amount of live storage in a reservoir therefore reducing the amount of water that can be used for ydroelectricity. The result of diminished river flow can be power shortages in areas that depend heavily on hydroelectric power. T he turbine overall efficiency, is calculated as the ratio of power at outlet point compared to the generated power. It is because in natural the head and velocity of water source is not possible remaining constant. It will influence capacity factor lower than 100%. During the experiment, there might be some error that affects the result of this experiment. The errors that might occur are parallax error while recording the readings or inaccurate time counting.Besides, before starting the experiment, the water lever of the tank storage should be checked for remaining at acceptable water lever. CONCLUSION From the experiment that was done, we can conclude that the turbine velocity is increase with the flow rate, output torque, and hydraulic power but decrease in efficiency and mechanical power. REFERENCES †¦ Ab Aziz Abdul Latiff, Zawawi Daud, Noor Azila Ahmad, Hartini Kasmin, Wan Afnizan Wan Mohamed,†¦ Zarina Md Ali. (2007). Hidraulik. Penerbit UTHM APPENDIX †¦ Original Data Sheet

Tuesday, July 30, 2019

Hardy Neutral Tones †Pathetic Fallacy Essay

Throughout Neutral Tones, Hardy effectively communicates his feelings about love using the natural world and its (neutral) colours and characteristics. His use of rich imagery of the natural world produces a melancholic note about love, which resounds through the whole poem portraying the end of an affair between Hardy and his former lover. The backdrop of the poem is set in the first stanza as a ‘winter day’. Hardy uses the time of year to convey a sense of melancholia as winter often has a negative connotation and is associated with colder feelings and emotions. In this way, ‘winter’ could be representing the frosty nature of the relationship and how Hardy’s former lover was cold towards him. The descriptions in the first stanza are all colourless (neutral tones) which suggests that Hardy feels as if he has no colour in his life, no love. His negative feelings about love are conveyed especially effectively here because they are expressed right at the beginning of the poem – this sets an unhappy tone for the first stanza, which deepens further into the poem. In the second line of the first stanza, Hardy describes the sun as ‘white’ and ‘chidden of God’. His use of the colour ‘white’ suggests that his feelings about love are blank (or neutral), lifeless, and even depressing. It contrasts with the typical colour of the sun – yellow – a symbol for vibrancy and happiness, both emotions that Hardy does not feel about or achieve from loving the woman. In addition, the sun and pond are circular and non-angular in shape; this portrays that Hardy feels as if there is no escape from the negativity that he finds to be attached to his love and that it is never ending, in a loop. Hardy also may have meant for the sun to symbolise his relationship – God could have made it shine with yellow positivity, but instead He has made it a drab white tone; perhaps Hardy feels as if his relationship and love have been condemned by God. Hardy’s miserable feelings are further emphasised by the alliteration of the letter ‘L’ in ‘a few leaves lay’ – when read aloud, the sound of the letter creates a kind of idle yet unsettled tone which relates to Hardy’s feelings towards love. He feels idle yet unsettled in the sense that whilst he cannot do anything to stop his affair from falling apart, he does not wish for it to do so. The ‘L’ sound contrasts with the ‘S’ sound later in the line, which is a harsher, more acute sound, perhaps representing the attitude of the lover towards Hardy at the end of their affair. The image created by the ‘few leaves’ symbolises Hardy’s feeling that the love between him and his lover is disintegrating; the leaves are related to natural life dying, but in this instance Hardy uses a metaphor to relate the leaves instead to love dying. The ‘starving sod’ suggests that Hardy feels that his relationship is ‘starving’, as if it were not being ‘fed’ enough love to keep it strong and happy and it has therefore been reduced to ‘sod’ – treaded on and not special. The leaves that ‘had fallen from an ash, and were gray’ symbolise the way that Hardy and his lover have also ‘fallen’ out of love. ‘Ash’ could mean ashes as well as the type of tree, carrying on the theme of death that was introduced earlier in the stanza. Also, the colour of ashes as well as the leaves is ‘gray’, a neutral colour, suggesting that Hardy has quite reserved feelings about love. In addition, the description of the fallen leaves from the ash is quite gentle – that is, that the language is relatively reserved. This conveys the lack of passion that Hardy and the woman share within their relationship. At the end of the third stanza, Hardy’s lover’s bitter grin is described as sweeping ‘thereby/Like an ominous bird a-wing†¦Ã¢â‚¬â„¢ This suggests that Hardy feels a sense of impending doom about love and his relationship with the woman as if he knows that something harmful is bound to happen in the future and that the relationship is going down a dangerously steep downhill slope, destined for a crushing ending. The ‘bird a-wing’ kind of represents how his love and passion for the woman is flying away, like a bird. Another interpretation is that Hardy feels that the ‘ominous bird’ mocks him, circling over him like a bird of prey – he is stuck in a cycle of love and pain in his relationship whilst the he imagines the bird soaring free. In the last stanza, Hardy refers to the sun as â€Å"God-curst†. This depicts a change in Hardy’s feelings about love from the beginning of the poem – his language starts to show anger, rather than sadness. The reader or listener may interpret this as a religious reference from Hardy – perhaps he feels that his failing love is inevitable because it has been predefined by God (this introduces the idea of fate coming into the equation). The poem starts and ends with the same location and memory – the pond. This suggests that Hardy feels like he cannot escape from the constant cycle of love and pained grief that he has been experiencing, and that his memory of the pond scene and his feelings about love keep on repeating in his head; perhaps Hardy feels somewhat trapped within his own mind with no escape. Hardy’s description of the natural world at the end of the poem, ‘Your face, and the God curst sun, and a tree,/And a pond edged with grayish leaves.’ is very blunt and mostly monosyballic symbolising blankness, as if Hardy’s feelings are numb. This contrasts greatly with the much more emotive and descriptive language he used at the beginning to depict the same objects. This change suggests that Hardy has changed his view about love to a more cynical one, feeling as if love ‘deceives’ and tricks him. Hardy uses this paradox to combine the feeling of melancholia and the notion of a passionless relationship, emphasising the point that what passion there once was between Hardy and his lover is there no longer.

Monday, July 29, 2019

Criminology 3001 Assesment 3 Research Proposal Example | Topics and Well Written Essays - 1500 words

Criminology 3001 Assesment 3 - Research Proposal Example The fundamental benefits of community policing is that it provides mobility to the law enforcement agencies to respond to criminal complaints, increase positive attitudes towards police, and reduce fears of crime (Anderson 2005). What interests this researcher is the fact that in a country where 60 police officers are entrusted with 1000 serious reported crimes (Billante 2003), community policing seems to be an ideal solution to increase police vigilance and strength at a minimal cost to the government. Experts are of the view (Grabosky 2009; Hodgson 1998; Mukherjee and Graycar 1997) that community policing is an effective method for responding to the community’s needs for security, crime deterrence and peace keeping. It involves programmes which encourage members of the community to participate actively on behalf of the police in crime detection and prevention as well as maintenance of public order. Yet, there has been little research carried out to evaluate the effectiveness and cost-efficiency of community policing. The purpose of the following proposal is to evaluate whether there is a need for investigating it in terms of value of community contribution, impact on police efficiency, cost of implementing community policing systems, and most importantly reduction in crime rates. How effective are the different types of community policing programmes, especially in addressing modern crime and disorder situations like terrorism and delinquent behaviours in the marginalised communities? 2.2. A combination of theoretical exploration, interviews and evaluation shall enable the researcher to study the efficacy and effectiveness of community policing, the gaps therein in its implementation, and hopefully present radical solutions to the justice system, crime prevention departments, citizens community, and criminology academia. The key objective to policing is

Sunday, July 28, 2019

Analysis paper on Cathedralby Raymond Carver Assignment

Analysis paper on Cathedralby Raymond Carver - Assignment Example As the host, the narrator has to contribute in the conversation to keep the guest comfortable. Despite his fears and prejudices, he takes the obligations of a hospitable host. It is in this setting, mood, and atmosphere that the narrator experiences change. The setting allows events to run from dining together to sharing of drinks. Throughout these events, the narrator observes the blind man with keen interest trying to understand his world. At the beginning of the story, the narrator doubts the close relationship between his wife and the blind man. His insecurities and closed-mindedness limit his happiness in marriage. As they share a meal in the dining room, the narrator realizes that despite his lack of vision, Robert can comfortably observe the dining etiquette. The narrator’s view towards the blind changes, as the plot of the story unfolds in his house. After dinner, a few drinks and cigarettes, the narrator’s wife falls asleep in the living room, leaving the two men to talk. The narrator intends to use the television as an escape from engaging in a conversation with Robert. Robert lacks vision and this creates a barrier between the two men. The open-minded blind man is not willing to go to bed but prefers to get to know his host better. Despite his attitude towards Robert, the narrator gives in to the guest’s request and the two indulge in a conversation on cathedrals. This conversation crops up because of a channel on the television that seeks to expose the viewer to cathedrals from different cultures. The setting poses a challenge to the narrator to take the initiative of enlightening Robert on the appearance of cathedrals. Due to lack of vision, Robert cannot imagine the appearance of a cathedral. The situation at hand forces the narrator to try to paint a picture of a cathedral using words but fails. This is the point at which the two men realize the need of a better connection. The two belong to

Saturday, July 27, 2019

Critically evaluate the proposition that states are the worst Essay

Critically evaluate the proposition that states are the worst perpetrators of terror ( criminology) - Essay Example State crime is treated as a response or a consequence to the incidence of threats to national security, insurgent violence or a phenomenon that is endemic to the transitional and the third world countries (Ross 2000, p3). State crime is infiltrative and is committed in varying degrees by all countries in the world. The state is considered as the initiator rather than the target or the mediator of the crime. Despite the fact that the private institutions hold more forcible power, the state still holds the special legal authority to compel to do something (Ross 2000, p3). State crimes include homicide, sexual assault, crimes of violence, serious assaults, torture, kidnapping, embezzlement, bribery, all forms of corruption and economic crime. The magnitude of such crimes is sometimes very big and ordinary words like murder become inadequate and they are replaced by terms like genocide. Some of the most serious crimes in the world are committed by the state. This paper will critically evaluate state crimes in light of its seriousness in various occasions. Corruption can be described as the abuse of the public office for personal gain and the abuse of the public power for personal benefit. The World Bank defines corruption as the abuse of the public office for personal or private gain. The Transparency international defines corruption as the abuse of delegated for personal or private gain. Corruption is a form of behaviour that deviates from the official duties of the public role (Stachowicz-Stanusch 2010, p132). Corruption can be either be passive or active and this is dependent on the person to whom it is being requested or the person who has the power of decision making. Corruption can be private among certain individuals. Public corruption happens in the public sphere of government administration and politics (Stachowicz-Stanusch 2010, p132). Some examples of corruption include collusion, bribery, fraud, embezzlement of public funds, theft, abuse of

Friday, July 26, 2019

Meeting the Needs of Millennial (Gen Y) Students in Higher Education Research Paper

Meeting the Needs of Millennial (Gen Y) Students in Higher Education - Research Paper Example The technological and sociological changes have influenced greatly upon the educational needs of millennial students. Internet has been the main influence on the educational process on the Generation Y students. Their needs are very different from older generations and educators have been trying to find how they can meet the needs of millennial students. In this paper we will review some existing literature and identify the gaps that exist in the researches done on identifying and meeting the needs of millennial students in higher education. Later in the paper personal perspective will be given on the issue of meeting the needs of higher education students. It is very important to first and foremost identify the needs of higher education students of Generation Y students. Much work in done in this regard as student needs are not only important for educational needs but also for business purposes. It is very important for universities and college to assess the needs of students and fulfill them in order to attract more and more students. New methods are being employed in universities in order to facilitate learning. The use of technology is one of the most basic improvements in educational facilities in the past decade or so. The infusion of technology is considered necessary in order to fulfill the requirements of millennial students as they belong to the information age (Dede, C. 2004). Computer technology is being made available to the students on campuses. Universities invest heavily on computers and internet because for young students these technologies have become a part of life and without it learning process cannot continue. Wireless internet services are now part of almost every university. This should be seen as an attempt by higher education institutions to meet the needs of millennial students. Universities are not only investing in computer technology and internet but they are also using

Lnternational Marketing of Coca Cola Essay Example | Topics and Well Written Essays - 2750 words

Lnternational Marketing of Coca Cola - Essay Example This study looks into Coca Cola Enterprises Limited that intends to introduce a new energy drink in Chile. The drink is Lucozade which is made by using Glucose Fructose Syrup, orange juice from Concentrate, Citric Acid and Sodium Benzoate. The company has already made the decision for the selling price by establishing a price which should not be more than 5% difference with existing drinks in the market. The packaging shall be done in both 275ml plastic bottles and 250ml cans. The company intends to Launch Lucozade brand in Chile. Most of the consumers are health conscious and prefer the low calorie energy drinks. The promotional activities will include endorsements by sports personalities and mass advertisements. The company has set enough financial resources for the operations and timelines for the execution of the marketing plan. The marketing organization includes the chief marketing director, the territory directors, the area directors and the public relations personnel. A situa tional analysis is the foundation of the marketing plan. The situational analysis will include a thorough examination of the internal and external factors which affect the introduction of Lucozade drink in Chile. It will enable Coca Cola to understand the factors which will influence the market growth in the future. Internal analysis will consider the strengths and weaknesses of Coca Cola enterprises Limited. The internal analysis will consider the company culture and image, the staff, the operational efficiency and capacity. (Kotler 2010). The internal analysis will also consider the weaknesses which hinder the launch of the Lucozade drink in Chile and which may impair the growth in market share and profitability. The external analysis will evaluate the suppliers, the trade partners, customers, new technology, competitors and the economic environment prevailing in Chile which may enhance the operations of Coca Cola Enterprises Limited in Chile (Dibb, Simkin, Pride and Ferrell 2005) . The external analysis will also consider the treats which exist in the market which could curtail the achievement of the Coca Cola Enterprises objectives in Chile. 2.1 Market Summary Coca Cola Enterprises Limited is the world’s largest bottler of non-alcoholic drinks by volume. The company produces, sells and distributes its drinks using a wide distribution channel which covers all the continents in the world (Kotler 2010). Coca Cola Company is the largest bottler for the Coca Cola Company since it produces 20 percent of the entire Coca Cola drinks world wide. 85 % of its products are classified as carbonated soft drinks while the rest are non-carbonated soft drinks. The company annual revenue was $ 21.65 billion in 2009 while the net income from its operations was $ 731 million. 2.1.1 Market demographics This section of the marketing plan will include analyzing the customers in terms of the demographic features such as the age, the race, gender, educational attainments, ma rital status, income levels, attitudes and beliefs, and the household size. Chile population comprises of 15,166,500 people but the population has been on the decline due to controlled birth rate. It is estimated that the population is likely to hit 20 million people by 2050. About 80 percent of the populations live in urban areas with the population mainly concentrated in Greater Santiago. Chile population consists of all races including European and Indians. The most dominant religions are Roman Catholics and Evangelical (Kotler 2007). Spanish is

Thursday, July 25, 2019

The Role of Women and Their Development in South Africa Essay

The Role of Women and Their Development in South Africa - Essay Example As the discussion stresses women's contribution to South Africa economic and political arena are increasingly being recognized, but more opportunities are needed for women to fully develop and demonstrate their full potential in this male dominated society. There are still many obstacles women have to overcome before substantial progress can be made on their behalf. In this paper we are going to test a hypothesis that in order for the women of South Africa to develop and take on a more hands on approach toward their future and their country's future they must demand and be given the right and opportunities afforded their male counterparts.This essay discusses that since the dawn of 20th century women of South Africa have been really active in the political and economic life of the country. They were active participants in different kinds of organizations including liberation movements which highlighted their importance in South Africa development. Trade union movements and their stri kes were the road to politicize women.  From 1920s women started to organize, by 1930s women trade unionists led the opposition. With the development of economy in the 1930s and 1940s women became urbanized which gave them power to organize other women and black industrial workers. Though their efforts were crippled by the legislation, they still led illegal strikes.  The union movement served the ground for women to arise as political leaders.

Wednesday, July 24, 2019

Concept Essay on effect of divorce on kids Example | Topics and Well Written Essays - 250 words

Concept on effect of divorce on kids - Essay Example They learn to cope with the circumstances resulting from divorce. Since all children possess unique qualities, they react to counseling strategies in their own ways. Their age and development phase counts very much toward their reaction to counseling. Moreover, the parent with whom the kids are residing must give proper care and attention to them. Although it is hard for the parent to resume a normal life (Berry, 1999, p.21), yet it is important for him or her to remember that they have to play double role for their kids now, both father’s and mother’s. The parent can also get them admitted in extra-curricular classes and activities like yoga, karate, swimming, and aerobics, so as to keep them busy. This will make them refrain from any negative thoughts. To make them live a healthy life, the parent should encourage them to spend quality time with friends, relatives, and neighbors- people who are one’s greatest â€Å"support network† (Heubeck, 2014, para. 6 ). In short, raising kids after divorce is never easy. The parent who is going to keep the kids must show extra courage and strength so that he may be able to carry the financial and emotional burden of the children. Otherwise, children may develop many negative behavioral

Tuesday, July 23, 2019

Fibre Optics Essay Example | Topics and Well Written Essays - 1500 words - 1

Fibre Optics - Essay Example One of the modern and commonly used applications of fibre optics is high resolution visuals (HDTV) which has enabled us to view broadcasts at 1080p screen resolution which is a result of FTTc and FTTh (fibre to the curb) network. Satellites making use of fibre optics do not have to undergo lessening (fibreopticsinfo). There are generally six theories of light from which the theory of optical fibre has evolved. The relevant theories to optical fibre are emission theory, corpuscular theory, wav theory, electromagnetic theory and quantum theory. Reflection and refraction of light are vital elements in optical fibre. These two properties have been explained by Newton in his laws. Another very important property relative to fibre optics is the critical angle of light. Critical angle is defined as the minimum angle which can allow total internal reflection to take place. This is governed by Snell’s law. There are two theories which explain the propagation of light through optical fi bres. The first theory is the ‘Ray Theory’ under which light is considered to be a simple ray of light and the propagation properties are relevant to that. This theory explains the accepting and guiding behavior of light inside a fibre (Sathish Kumar). The second theory is the ‘Mode Theory’ or the ‘Wave Representation’ approach. According to the Mode Theory, light is an electromagnetic wave and acts like an electromagnetic wave inside a fibre. This theory explains the phenomenon of absorption and dispersion of light inside a fibre as well as its attenuation (The Theory of Optical Fibres). Fibre optic cables are the source of transmission of light using the fibre optics technology. Fibre optic cables enable light to be transmitted along them from one point to another and there is no significant loss in the intensity of light which passes through fibre optical cables. The construction of a fibre optic cable has three main parts: A central core, c ladding and a Plastic Jacket surrounding both the core is present at the centre of the cable which acts as a buffer. It is composed of fine quality thin transparent glass polymer or a dielectric. The refractive index of the core is ?1 and the diameter of the central core ranges from 10 ? to 100 ?. surrounding the central core is a jacket layer of plastic or glass called Cladding. The refractive index (?2) of the cladding has to be smaller than that of the central core so that the light stays inside the core due to total internal reflection (?1 > ?2). Safety and strength are provided to cable by surrounding the cladding and the central core with a plastic jacket or the buffer (Loremate). The transmission of light by fibre optics has the same basic components as the normal wiring transmitting devices. The system comprises of a transmitter, a medium through which the signals are propagated and a receiver. The propagating medium is a cable in case of fibre optics. The transmitter has an ability to emit light with the help of either a light emitting diode or a laser. The user inputs data into the transmitter in the form of audio, video or other data. The encoder or modulator used in the transmitter to convert electrical signals to optical signals is AM, FM or

Monday, July 22, 2019

Coketown described by Charles Dickens - Criticism Essay Example for Free

Coketown described by Charles Dickens Criticism Essay This passage has come across a monotonous and dull town surrounded by industrialization. There is no colour, no aesthetic beauty but just buildings and factories that are an eyesore to the whole town. This town was once a nice place and it was a town of red brick but because of all the smoke, dust and dirt it has now all changed to black brick. There is no life left in the inhabitants of the town. They are just servers to the town and they arent even considered the characters of the passage. They are dehumanized and instead the buildings are the characters that take over. The buildings seem to literally take over the human qualities and are given priority and superiority to the people. There is no change or difference between one building and another. The Jail might have been the infirmary; the infirmary might have been the jail. There is a sense of sameness and uniformity. Other people get life out of what Coketown sacrifices. The people of this town are stuck with this lifestyle forever as there doesnt seem to be any way out if it. The town is literally doomed. There is the image of serpents which give off the evil part to this town. It is almost as if the people are under the influence of this evil task master from which the inhabitants can never hope to escape. There is also the image of water which is usually the symbol of life and purity but in this case the water has become a victim of this so called progress. This lifeless town is basically sustained by what it makes and produces. These people are sacrificing their lives and their town in order to survive. The only thing that seems to be done in this town is work and more work; there are no natural sights or pleasure in its perspective. Everything is made just for purpose and function. Even the chapel built which is supposed to be an inspiring building and have meaning to people is described as a warehouse. There is a feeling of entrapment in this town such as the bird cage image used. These people have no knowledge of life out of this town. They are mechanical soldiers who feel enslaved to working for this town and feel like it is their only purpose to life. The people are alienated from each other as they dont even seem to try and change this strict and totalitarian system. There is nothing more than facts and nothing seems important besides facts. It is a perverted world where people have lost their humanity and inanimate objects get a life of their own. This town seems to be what controls the people and unfortunately the people all seem to be too intimated by the system that they wont even consider speaking up about the corrupt lifestyle they all live each day. There is a major devoid of natural life and the people are helpless to the situation.

Sunday, July 21, 2019

Human The Cause Of Global Warming Environmental Sciences Essay

Human The Cause Of Global Warming Environmental Sciences Essay The increase in the temperature of Earths atmosphere and the troposphere influence the changes in the climate. Carbon dioxide emitted due to the burning of fossil fuels which usually trap heat. This has a significant effect on the various components of the Earths eco-sphere. Global warming is more likely to be a phenomenon that comprises of climate changes. This change includes changes in air, temperature, winds, ocean, and other earths climate. Generally changes in climate can be a combination of several natural forces that are happening over the various diverse timescale (Houghton; Warming overtakes predictions). History of Global Warming: Global Warming occurs due to several causes, such as natural as well as human activities. Pollution and emissions are caused by human activities which lead to changes in global climate. In this world, human are responsible for global warming. Various reasons are responsible such as growth of population, industries and environmental degradation. All these activities are performed by human but this have negative influence on the environment (Global warming). The history of global warming is underlined according to the years. They are: 1800-1870: The first industrial revolution occurred and measured carbon dioxide levels in the atmosphere. 1896: Global warming was calculated for the first time due to the emission of carbon dioxide witnessed on a global scale. 1930s: Global warming was accurately confirmed and reported in the late 19th century (The Discovery of Global Warming, 2011). Thesis Statement: Humans are the cause of global warming for several reasons include industry, population growth and environments degradation. Industrial Revolution: Industrial Revolution was a major turning point in history which had negative consequences on Global Warming. During the 1700s and 1800s, some drastic changes took place in the daily lives of individuals and these changes in the economy occurred because of the development of industrialization globally. These changes termed as Industrial Revolution in the economy was a turning point in the world that has negative consequences over the population. It also restricts the growth of individuals as well as nations. Basically, the transformation of workers based industries to the machine based is typically termed as Industrial Revolution. The industrial revolution is the substantially beginning of the era of energy consumption, burning of fossil fuels, and emission of carbon dioxide that are continuously declining the quality of air in the environment and increases global warming (All About Global Warming; Global Warming 101, 2007). Transportation is one of the greatest contributors to the global warming from last five decades. Transportation accounts for 30 percent of all greenhouse gas emissions in the United States-two-thirds of that from automobiles and other vehicles-and many others developed and developing nations face similar challenges. (All About Global Warming)It is analyzed that transportation has significant impact on the economic sector. Transportation is mainly depends on the petroleum products which increases emission of carbon dioxide in the environment. It is observed that transportation is about third of the country which is changing climate rapidly. In the worldwide cars, airplanes, trucks, ships and other vehicles are the means of transportation. In this industrial revolution, competition is going to be high day by day and it has adverse effects on economy. Reducing emission by controlling the transportation is the vital step for fighting against the global warming (All About Global Warming). Factories are the means which facilitate development to the economy in the worldwide. It produces goods as according to the needs and wants of each individual by analyzing market. One of the best ways to reduce global warming is to use renewable energy that doesnt emit greenhouse gases. (All About Global Warming) Some of the factories emitted gases due to the activities of human being in the factories. Usually carbon dioxide emitted due to the burning of fossil fuels which usually trap heat. This affects the living mechanism of human beings and cause Global Warming (All About Global Warming). Electricity generated from the various means such as hydro electric dams, solar power, wind generators, geothermal power and any other means which releases carbon dioxide in the environment. Climate change, specifically global warming, has captured the attention of people worldwide and has inspired more debate and action-personal, political and corporate-than perhaps any other environmental issue in history. (All About Global Warming) Electric power is generated from the burning of fossil fuels like natural gas, coal and oil. This burning of fuels releases Co2 into the atmosphere. Coal burning plants are the main source of electric power in most of the countries. The electric power contributed in the increase of global warming. The conversion of electric by various means may be helpful to the people as well as environment (All About Global Warming). Population Growth: The worlds total population rose to 7 billion people. The population of the world is growing rapidly with the pace and it is not easy to stop its growth. The growth of population is the root of all problems related to the environmental and climatic changes. This growth pace of population is rapidly clearing woods and forests from the environment and world have scarcity of agricultural land. This turning of huge forest area into the agricultural land has significant impact on the environmental climate. As per the data, the worlds total population reached to the 7 billion. One day if this surplus of population is not restricted then individual will run out of land. This increased population rapidly enhancing global warming (How Global Population Growth is Creating Serious Environmental Problems). Over Consumers of the fossil fuels and goods are contributed to the global warming. Trends such as the loss of half of the planets forests, the depletion of most of its major fisheries, and the alteration of its atmosphere and climate are closely related to the fact that human population expanded from mere millions in prehistoric times to over six billion today, (How Global Population Growth is Creating Serious Environmental Problems). This rapid growth of population is increasing number of consumers in the worldwide. But in the recent time consumers are over from the limit. So for fulfilling the requirements of each consumer, society has maximized the usage of natural resources which resulted as scarcity of sources in the environment. Consumers are normally produces greenhouse gases by burning of fossil fuels and which produces carbon dioxide. So if consumer will be over then they will more increase global warming. Life Style in the recent time is going to be a status symbol for consumers and which have contributed to the increment of global warming. Today, people are more concern for their living standard. Lifestyle highlights the usage of various standard products in the market. It comprises of various transport vehicles that are going to be status symbol for people. Consumers are purchasing cars and vehicles in order to maintain their lifestyle. While population numbers in most developed nations are leveling off or diminishing today, high levels of consumption make for a huge drain on resources. Americans, who represent only 4 percent of world population, consume 25 percent of all resources (How Global Population Growth is Creating Serious Environmental Problems). This excess usage of transport vehicles increases emission of carbon dioxide which is the main cause of global warming. Migration is the mechanism for human being to adapt diversified living circumstances. It is part of natural resources which is based on the seasonal movements of fishing communities, pastoralism as well as long term phenomenon. Global warming is progressive in nature and have significant impact on the population. Industrialized countries also contribute far more to climate change, ozone depletion and overfishing than developing countries. And as more and more residents of developing countries get access to Western media, or immigrate to the United States, they want to emulate the consumption-heavy lifestyles they see on their televisions and read about on the Internet (How Global Population Growth is Creating Serious Environmental Problems) Global warming causes flood cycles and storm which increases the level of sea. This rise in sea level affects the populated regions in the worldwide. When these diverse climatic changes create unbalanced circumstances then it resulted as human leaved their areas in order to search alternatives. Global warming as an resulted for migration and usually seen in this society (How Global Population Growth is Creating Serious Environmental Problems). Environmental Degradation: Environmental degradation problems are caused by human activities. Environmental degradation is the corrosion of the environment though the reduction of natural resources, ruin of ecosystem and disappearance of animal and plant species. It is resulted by the human activities that have directly or indirectly increased from the time when Industrial Revolution came in light. Environmental degradation is resulted in several ways such as individual actions and also caused weakening of natural resources. Other then these, environmental degradation is also caused due to the natural occurrence which also damage the environmental resources. Some human activities like burning of fossil fuel, mining, pollution, deforestation are lead to environmental degradation (Habitat Destruction). Deforestation is the phenomenon of cutting trees in order to make spaces for industries and houses for rapidly increasing population. As it is known that trees plays imperative role in the balancing ecosystem but this excessive cutting of plants for the usage of human activities is damaging the environmental balance. One of the major drawbacks of deforestation is it dislocate the cycle of water. As trees are responsible for its disrupt the water and liberate moisture in the environment. As population increases, humans use more land for agriculture and cities and towns spread out ever-widening areas (Habitat Destruction). Excessive cutting of trees serves climatic changes. Trees contain major part of the carbon dioxide and during the photosynthesis process it locks environmental carbon dioxide. But deforestation increases the amount of carbon dioxide as well as other greenhouse gases in the atmosphere along with this burning of fuels emitted carbon dioxide in the huge amount these int egrally trap the environmental energy which resulted as increase in earths temperature and this increase in temperature near the earths surface causes Global Warming (Habitat Destruction). Food Supply is the problem which is lead by the increased population in the worldwide. As per the analysis, around seven billion of population is measured in all over the world. This rapidly increased population affects the supply of food in the worldwide because resources are limited but conversely population is increasing with pace. If the population will increase with this pace then it will be difficult to feed each individual. This causes global warming with the increasing population (Global Warming 101, 2007). The Waste Production of good and products in the environment have adverse effects on the growth of individual as well as society also and it also leads to global warming weather directly or indirectly. Every year these emissions currently add to the carbon already present in atmospheric carbon dioxide a further 7000 million tonnes (Houghton). Industries produce material as per the requirements of society for fulfilling their requirements but at the time of manufacturing finished goods some wastage of products are produced indirectly which affects the atmosphere and destructing the balance of ecosystem which causes global warming (Houghton). Counterarguments: In the todays world, some of the people do not have faith that the global warming is resulted by the human activities and it also affect ecosystem. Although they believed that global warming phenomenon is lead by the natural process. In their view all the warming problems are the resulted by natural uncertainties. Refutation of Counterarguments: People believe that natural uncertainties are responsible for the global warming and human activities have no affects on ecosystem. It is completely denied because in reality human activities are responsible for the increment of global warming. Their activities such as transportation, population growth, and excessive use of energy resulted global warming in direct or indirect ways. Conclusion: Global Warming is caused due to natural as well as human activities. Pollution and emissions are caused by human activities which lead to changes in global climate. Human are responsible for global warming. In the rapidly changing environment, competition is high and consumers needs are increasing day by day for overcoming this problem there is need to take certain possible steps for the betterment of society with control over global warming. After analyzing the cons of global warming there is need to put effect in order to restrict global warming in the atmosphere. Following recommendations are made for minimizing this major problem: Greening Transportation: It is analyzed that transportation sector is the more responsible for the emission of fossil fuel. Some technologies for energy efficiency are available for the less usage of energy. This techniques aid to save money as well as environmental assets. Boosting Energy Efficiency: Nowadays energy is used by various means such as heat, energy equipments etc. This can be controlled by minimizing unnecessary the usage of energy products. Revving Up Renewable: The renewable energy sources like wind, solar, bioenergy and geothermal are the available and researched technologies that may meet the level of energy needs. These techniques are very cost efficient and also identical for the atmosphere. Managing Forests and Agriculture: A people can flight against the global warming by reducing the deforestation and agricultural emission. For this purpose there is need to develop awareness among the individual about the global warming and its causes and then motivates for trees plantation. Increased number of trees can flight against the global warming. Developing and Deploying new low Carbon and zero Carbon Technologies: The development of new technologies for low carbon may possess time. So the current researches are good enough that may reduce the global warming. Phasing out Fossil Fuel Electricity: For reducing the usage of fossil fuel, it is mandatory to take positive corrective action according to the climatic changes. Certain step should be taken such as no new plant of coal burning, shutdown all coal plants etc that may somehow minimize the effects of global warming (Solutions to Global Warming).

The History Of The Value Delivery Network Marketing Essay

The History Of The Value Delivery Network Marketing Essay In todays business world, marketing is an effective tool in order for businesses to succeed in retail development for customers. To understand marketing, the perception of its definition is very important. People see marketing from different points of view forgetting some of the most fundamental functions. Marketing is more than just buying or selling. Here are three marketing definitions from different prospective As a personal definition, marketing is the heart of a business. Marketing is responsible to accommodate the customer needs by adjusting products or services. Some of these adjustments are such as prices, hours, product quality, product quantity, custom made product, or special service. A good example of marketing is taking place at Pacific Hospital of Long Beach. The marketing department is responsible for identifying the needs of the patients to increase the customer base and in turn boost net profit and repeat customers for services rendered from the facility. Some of th e issues that were addressed by the marketing department that do satisfy the needs of the patients are: providing quality services at a competitive price, free transportation for surgeries at the facility, hotel accommodations when patients are from out of town for the family members, private rooms during the patients stay, a home like atmosphere in the patient rooms to make the patients more at ease, extra meals for visitors, and financial aid. Providing these extra services gives the customer more options to choose from when determining which facility to use. By providing these extra services, the marketing department has increased the customer flow (daily census) to the hospital, and the hospital has achieved some of the companies stated business goals, specifically, an increase in profitability, and contributing to the business growth. Another marketing definition would be marketing is the developing and positioning an e-content product someone who will want to buy (Scott, 2004). In this definition, marketing will define a product in which customers will want to buy. Then the development of the product will take place. Here is a good example. Fast food restaurants need to compete with each other on pricing and new products. Marketing is responsible to create these new products. The marketing department of each firm will perform research for a product that customers will buy such as when McDonalds created a successful meal for children, the happy meal. The happy meal includes a toy with the meal and an attractive toy box that most of the children want to have. When the marketing research revealed that children from ages two to 10 years old were very interest in the toy more than a regular meal, the marketing department concentrated on the development of the happy meals brand creating new and very attractive toys on a season basis. This product or marketing tool increased sales for Mc Donalds business. Here is the last definition of marketing. Marketing is the process of planning and executing the conception, pricing, promotion, and distribution of ideas, goods, and services to create exchanges that satisfy individual and organizational goals (Kotler, 2001). This definition gives the understanding that marketing is not only about advertising, public relations, product placement, or promotions. Marketing focus more on the satisfaction and needs of a customer as this relates to business. The process brings together the four Ps and other factors using a well thought-out plan to achieve the companies marketing goals. These goals are to retain old customers and achieve new ones, and at the same time increase the business profitability. In conclusion, marketing is an important factor that will contribute to a businesses success. Marketing will assist any business or organization to succeed in the most cost-effective way. An effective marketing tool will reduce costs and can increase profitability for any business or organization. Marketing will assist businesses to achieve any business goal, and at the same time can increase customer satisfaction. When a customer is satisfied, customers will be loyal to that business, and this action will contribute to the businesses growth potential. Marketing is not only about buying and selling. Marketing is also about satisfying customers and the companies needs. Many individuals may think of marketing as the way a business advertises their products and or their services. Others may believe advertising is how an organization carries out their public relations or promotions. A few individuals consider marketing to be selling or advertising. In a way this is true because in order for marketing to be carried out properly selling and advertising are a few key roles of the marketing process (Perreault McCarthy, 2004). Jan Welborn Nichols and Ann Arbor describe marketing as ones strategy for allocating resources (time and money) in order to achieve ones objectives (a fair profit for supplying a good product or service) (Welborn Nicholas, 1993). As one begins to follow the passage below one will become familiar with different definitions of what marketing signifies, based on these definitions explain the importance of marketing in organizational success. Also, the following will provide a minimum of three examples from the business world to prove th e importance of marketing and the organizational success. What should a company do before and after it decides to produce and sell? As indicated by Perreault-McCarthy and Arbor a company should consider the following if the product one wishes to promote is a bike: 1. Analyze the needs of people who might buy a bike and decide if they want more or different models. 2. Predict what types of bikes handlebar styles, type of wheels, brakes, and materials different customers will want and decide which of these people the firm will try to satisfy. 3. Estimate how many of these people will want to buy bicycles, and when. 4. Determine where in the world these bike riders will be and how to get the firms bikes to them. 5. Estimate what price they are willing to pay for their bikes and if the firm can make a profit selling at that price. 6. Decide which kinds of promotion should be used to tell potential customers about the firms bikes. 7. Estimate how many completing companies will be making bikes, what kind, and at what prices. 8. Figure out how many to provide warranty service if a customer has a problem after buying a bike (Perreault McCarthy, 2004). Many may assume that the activities above are captured by production when in fact it is actually a part of a much greater process identified as marketing. This process directs the production of the product(s) and provides needed assurance that the right goods and services are produced and find their way to consumers (Perreault McCarthy, 2004). Another way an organization can market and organize successfully is by strategically integrating across the entire organization. As Jan Welborn Nichols and Ann Arbor describe marketing as ones strategy for allocating resources (time and money) in order to achieve ones objectives (a fair profit for supplying a good product or service) (Welborn Nicholas, 1993). One way to define this effort would be to do the following activities and consider marketing as a cycle that consists of: 1. Research: Research often begins with a guess, sometimes an informed guess based upon your observations, experiences, and belief system. Often the process of gathering information can feel counter-intuitive, especially when research indicates something other than what you believe (Welborn Nicholas, 1993). Research customer demographics, psychographics, and competitive intelligence. From this research a SWOTT analysis can be developed. 2. Strategy and planning: gathered from raw data, the marketing department can create a strategy and then implement 3. Branding: making a name for the product brand, how would the company like to be known by the consumer. 4. Product development: the complete process of bringing a new product or service to market. 5. Sales and sales training: as the product or service has been established and prior to bring the product to market the sales team must be trained and to ensure proper knowledge of the product and or service to close a sale. 6. Point of purchase (POP): materials needed to press sales: coupon holders, brochures, and promotional signs to name a few. 7. Public relations (PR), media relations, and public affairs: PR deals with the public to inform individuals of the new product and or service. Media relations strictly deal with the press. Public affairs transact with the various government entities that impact the organization. 8. Customer service: customer experience should be extremely important to the marketers for if the customer is not satisfied with the product and or service then the organization must run back to the drawing board to identify what went wrong with the product and service. One method to complete a marketing debate would be to include the four Ps (Perreault McCarthy, 2004). The four Ps consists of the following: product, price, place, and promotion. A few examples of the business world to prove the importance of marketing and the organizational success are Dell Computers, McDonalds, and Wendys. Dell Computers provides a service that nearly other competitors can not follow. For example, Dell can create a computer to the consumers needs as the client is on the phone. Then, the computer can be shipped to the consumer in nearly no time at all (Businessweek, 2005). McDonalds is known worldwide and is the number one fast food company leading in sales today. How does McDonalds do this? Combining tangible products and meeting the needs of the consumer Happy Meals (Hoovers, 2008). Wendys menu offers a diversity of menus and all for just about .99 cents (Businessweek.com, 2008). No one can go wrong with a .99 cents menu especially such a variety of foods. With such a diverse world people need a variety of foods when looking through a menu of the restaurant will lose interest and the client will be lost. Today marketing process can begin with an idea or a passion. As a company conducts research to determine if the idea has merit then one can begin to ask questions. Who are the organizations potential customers? How large is the target market? Whats the perceived value of the product? Who are the competitors? How is the idea unique? How can the organization communicate that uniqueness? In conclusion, marketing is important to many companies and is an essential piece to an organizations success. Success is of great importance in creating a foundation to produce a product and or service. The comprehension of the functionality and need for marketing is a good starting point in understanding whats the purpose and how it interrelates in a economy and enhances consumer responsiveness in its buying power. Defining Value Value creation The customer is buying satisfaction. Highest value is derived when the customer is satisfied. Some common myths in Value Creation Myth # 1 More is often considered value Buy one get one free schemes are rolled out. There is of course an instant sales push. However at the end of the scheme the customer feels that he had all along been paying 100% more for the products and perceives that very product as costly once the scheme is withdrawn. May switch to another product at the same price. Conclusion: Dissatisfaction leads to value erosion Myth # 2 Price is value Many businesses considers lower price as offering more value. More often than not lowest price products end up as the second best with a higher priced product with similar product attributes leading the market. The simple reason is the higher price product may be offering a higher satisfaction due to perceived values and imagery. Car markets are a prime example of this syndrome. Myth # 3 More Features and add on are value Businesses load a product or service with more features thus offering a higher value. While this may be attractive if the features are not backed by adequate supports the satisfaction may be less and value is reduced. We encounter this everyday. A customer buys a product with many features but not demonstrated properly or may not be serviced properly. Enquiries may not be handled effectively. Airlines offering add ons like free overnight accommodation are still not favored if the services, like enquiry handling, reservations, and time schedules are poor. Cell phones companies may be offering plenty of add on like national roaming or free incoming calls etc. However if the billing is poor and billing enquiries are not addressed properly the customer is dissatisfied and leaves the service for another provider. Myth # 4 Products are competing with similar products This is often true in the leisure industry. A movie theatre may not be competing with another movie theatre. If the customer is not satisfied with a theatre or movie he may look at options to other entertainment sources, for instance an amusement park. We may call them discretionary time products. Highest satisfaction levels are very important in this type of business. Value delivery VALUE DELIVERY NETWORK Globalization and technological innovation are creating dynamic network or chain of interconnected players to bring and deliver value to the end user. The notion that value can be created by cooperation has led marketers to search for win-win positions as a way to enhance profitability through collaborative value creation (Anderson, Hakansson, Johanson, 1994; Kanter, 1994). The idea of value creation and exchange is the foundation stone of relationship marketing. This view is based on three different assumptions of value exchange potentialities (Christopher et al., 2002). These value perspectives suggest that value is created; as an offering and delivered through recurrent transactions within a supplier-managed relationship; through mutually interactive processes and shared through negotiated agreement within the life of a relationship and shared in interactions that emerge from within networks of relationships. Thus value has been considered to be an important constituent of relationship marketing and the ability of a company to provide superior value to its customers is regarded as one of the most successful strategies. This ability has become a mean of differentiation and a key to the riddle of how to find a sustainable competitive advantage (Ravald and Gronroos 1996; Heskett et al 1994; Nilson 1992; Treacy and Wiersema, 1993). Walters and Lancaster (1999a and 1999b) determine value as the utility combination of benefits delivered to the customer less the total costs of acquiring the delivered benefits and is then a preferred combination of benefits compared with acquisition cost. There seems to be an agreement that value is a function of what a customer gets, the solution provided by an offering, and the sacrifice of the customer to get this solution. Consumers overall assessment of the utility of a product based on a perception of what is received and what is given, is known as perceived value (Zeithaml, 1988). In a relational context the offering includes both a core product and additional services of various kinds. Many companies today have partnered with specific suppliers and distributors to create a superior value delivery network, also called a supply chain (Magnet, 1994). Brown (1997) has defined supply chain/value delivery network as a tool to disaggregate a business into strategically relevant activities which enables identification of the source of competitive advantage by performing these activities more cheaply or better than its competitors. It comprises of larger stream of activities carried out by members like suppliers, distributors and customers. Further Christopher (2002) defines a value delivery network/supply chain as the network of organizations that are involved through upstream and downstream linkages in the different processes and activities that produce value in the form of products and services in the hands of the ultimate consumers. In order to gain competitive advantage value delivery network/supply chain collaboration or integration is required i.e. the backward/upstr eam and forward/downstream collaboration/integration. Mentzer (2001) says a value delivery network comprises of number of players in which a firm whether manufacturing or service, holds the key by creating and offering values in terms of output to its customers. This further can be justified with the help of the notion that the core of relationship marketing is relations, maintenance of relations between the company and the actors in its micro-environment, i.e. suppliers, market intermediaries, the public and of course customers as the most important actor. Thus the more pertinent issue is not what kind of an offering the company provides rather it is what kind of relationship the company is capable of maintaining.

Saturday, July 20, 2019

Autobiography of Charlie Chaplin Essays -- essays research papers fc

I was born Charles Spencer Chaplin in Walworth, London on April 16, 1889. I have an older brother, Sydney, but he’s only my half brother- same mother, different father. I was named after my father, but he was a drunk. He died when he was thirty-seven. My mother, Hannah, was a music hall entertainer. Both her physical and mental health fluctuated during my youth. One night, when I was five years old, she became sick during a performance. I went out on stage and sang in her place. I knew then that I loved performing, and I loved it when the audience threw money at me. It was difficult for my mother to make enough money to support me, Syd, and herself. Syd and I had to share a single pair of shoes, taking turns going from place to place. My mother slipped into insanity. We were constantly made fun of and the authorities separated the three of us for a year. By the time I was fourteen, I was forced to have her committed to an institution. I don’t like to remember my childhood. When I was about seventeen, Syd introduced me to Fred Karno, who led a vaudeville troupe. I succeeded in impressing him, and I subsequently became a member of the troupe. It was during my time in this troupe that I fell in love with a dancer, named Hetty Kelly. I asked her to marry me, but she, being only sixteen, felt that she was too young. I then asked her to wait for me until I returned from the troupe’s planned trip to New York. While spending time in New York, I started to become fascinated with the movies. I got a telegram one day from Mack Sennett from Keystone Pictures, who offered me a job in California. He promised $150 per week. I was off to Hollywood within the next month. When we I met Sennett, he did not believe that I was Charlie Chaplin. He said that Charlie Chaplin did the best drunk he had ever seen and that I was too young to be him. I immediately went into my drunk routine, which convinced him. He took me and said, â€Å"Forget everything you ever learned, you’re not in the theater anymore.† At first I was terrified by the movies, but it soon became very natural to me. I walked into a room of costumes and tried many different things on. Sennett and the rest of the crew grew angry as they waited for me to get myself dressed. â€Å"I thought I would dress in baggy pants, big shoes, a cane and a derby hat. Everything a contradiction: the pants baggy, the coat tight, the hat small... ...mas day, 1977. In all, I was in seventeen feature films, and over seventy short films. Works Cited _____. Biography for Charles Chaplin. Internet Movie Database Inc. Copyright  © 1990-2005. 11 January, 2005. http://www.imdb.com/name/nm0000122/bio. _____. Chaplin, Charlie. Columbia Encyclopedia, Sixth Edition, Copyrigt  © 2005. 11 January, 2005. http://www.encyclopedia.com/html/c/chaplin.asp. Chaplin, Charlie. â€Å"Rhythm: A Story of Men in Macabre Movement.† Script Magazine. January, 1938. Chaplin. DVD. Dir. Richard Attenborough. Perf. Robert Downey Jr., Anthony Hopkins, Dan Aykroyd, Diane Lane, Kevin Kline, Moira Kelly, James Wood. 1992. 144 min. Gerstein, David. Charlie Chaplin, A World Wide Web Celebration. 11 January, 2005. http://wso.williams.edu/~dgerstei/chaplin/intro.html. Haining, Peter. The Legend of Charlie Caplin. Book Sales Inc. 110 Enterprise Avenue, Secaucus, NJ. 1982. Lynn, Kenneth S. Charlie Chaplin and His Times. Simon & Schuster Rockefeller Center. 1230 Avenue of the Americas, New York, NY. 1997 Raymond, Tom. Charlie Chaplin Biography. â€Å"Clown Ministry† Copyright  ©WebRing Inc. 28 January, 2005. http://www.clown-ministry.com/History/Charlie-Chaplin.html.

Friday, July 19, 2019

Television Violence :: essays research papers

Television Violence   Ã‚  Ã‚  Ã‚  Ã‚  Violence in television, is it turning our children into violent, destructive, and hateful toddlers. Yes or no? In today's society television plays such a big role in our everyday lives that it is hard to see if it effects our children's behavior. Television has the potential of being a very constructive learning tool, if used correctly. On the other hand if used in a destructive manner it could, hypothetically, turn our children and future leaders of tomorrow into deadly hate mongers. I believe that television does effect the way people think and behave.   Ã‚  Ã‚  Ã‚  Ã‚  In a survey given in 1978 at an unnamed college in Washington D.C., when asked if what was seen on T.V. effected the way they acted ,2% thought it did , 7% didn't know and ,91% didn't think it effected them at all(2). In 1993 a similar survey was given in London by the Broadcasting Standard Council( BSC ). When people were asked if they thought T.V. effected the way people behaved 41% said yes, 4% left without finishing the survey, and 55% said that they didn't think it effected the way people acted(14).   Ã‚  Ã‚  Ã‚  Ã‚  As seen in the survey the problem of television violence is being made more aware to the people of the world. The problem has also grown over the years to a more serious dilemma making the government start to try and solve the problem by initiating laws in which television stations must limit violence on T.V.(6). It is still not enough though the problem must be taken care of promptly before it changes society as a whole. If the problem is not taken care of swiftly then it could effect the future of the world by having violence rampage the streets of our towns.   Ã‚  Ã‚  Ã‚  Ã‚  In the past when television was first invented it was a much happier time. people could walk on our streets without having to care if they were going to make it home alive. I'm not trying to say that television is the reason that society today is so dangerously violent, but as violence on television evolved so did the violence on our streets. In the past there were not as many violent T.V. shows if there were even any. Also T.V. was more of a family recreation, most families could only afford one T.V. set so when children watched T.V. they were supervised by their family making violence almost an impossible thing to see if parents were not interested. Today, there are an average of three televisions per household so it is harder for parents to make Television Violence :: essays research papers Television Violence   Ã‚  Ã‚  Ã‚  Ã‚  Violence in television, is it turning our children into violent, destructive, and hateful toddlers. Yes or no? In today's society television plays such a big role in our everyday lives that it is hard to see if it effects our children's behavior. Television has the potential of being a very constructive learning tool, if used correctly. On the other hand if used in a destructive manner it could, hypothetically, turn our children and future leaders of tomorrow into deadly hate mongers. I believe that television does effect the way people think and behave.   Ã‚  Ã‚  Ã‚  Ã‚  In a survey given in 1978 at an unnamed college in Washington D.C., when asked if what was seen on T.V. effected the way they acted ,2% thought it did , 7% didn't know and ,91% didn't think it effected them at all(2). In 1993 a similar survey was given in London by the Broadcasting Standard Council( BSC ). When people were asked if they thought T.V. effected the way people behaved 41% said yes, 4% left without finishing the survey, and 55% said that they didn't think it effected the way people acted(14).   Ã‚  Ã‚  Ã‚  Ã‚  As seen in the survey the problem of television violence is being made more aware to the people of the world. The problem has also grown over the years to a more serious dilemma making the government start to try and solve the problem by initiating laws in which television stations must limit violence on T.V.(6). It is still not enough though the problem must be taken care of promptly before it changes society as a whole. If the problem is not taken care of swiftly then it could effect the future of the world by having violence rampage the streets of our towns.   Ã‚  Ã‚  Ã‚  Ã‚  In the past when television was first invented it was a much happier time. people could walk on our streets without having to care if they were going to make it home alive. I'm not trying to say that television is the reason that society today is so dangerously violent, but as violence on television evolved so did the violence on our streets. In the past there were not as many violent T.V. shows if there were even any. Also T.V. was more of a family recreation, most families could only afford one T.V. set so when children watched T.V. they were supervised by their family making violence almost an impossible thing to see if parents were not interested. Today, there are an average of three televisions per household so it is harder for parents to make

The Wedding by Nicholas Sparks Essay -- The Wedding by Nicholas Sparks

â€Å"The Wedding† by Nicholas Sparks The novel â€Å"The Wedding† by Nicholas Sparks is a sequel to the love story, The Notebook. The characters in this novel are facing pretty much one big problem. The setting in this story is taken place in the year 2003 in a little place called New Bern, where the lives of the Lewis family would change in many ways. Wilson and Jane Lewis; a married couple for many years, are the main characters in this novel. They are facing a very difficult time in their lives. It seems as if Jane has fallen out of love with Wilson. Wilson is the kind of guy who spends far too much time at work. He knows he should be spending more time at home, but just never could find the time to do so. During the course of their life, they had kids and did everything a normal f...

Thursday, July 18, 2019

10 Worst Computer Viruses of All Time

10 Worst Computer Viruses of All Time Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable — according to Consumer Reports, computer viruses helped contribute to $8. 5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn't even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before prog rammers known as hackers began to build computer viruses. While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public's attention.A doctoral student named Fred Cohen was the first to describe self-replicating programs designed to modify computers as viruses. The name has stuck ever since. |Old-school Viruses | |Some of the earliest viruses to infect personal computers included the Apple Viruses, which attacked Apple II computers | |and the Brain virus, which could infect PCs. | In the good old days (i. e. , the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people.It wasn't until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itse lf via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses. We're going to take a look at 10 of the worst computer viruses to cripple a computer system. Let's start with the Melissa virus. Worst Computer Virus 10: Melissa In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro.He built the virus so that it could spread through e-mail messages. Smith named the virus â€Å"Melissa,† saying that he named it after an exotic dancer from Florida [source: CNN]. [pic] Daniel Hulshizer/AFP/Getty Images A courtroom photo of David L. Smith, the alleged creator of the Melissa virus. Rather than shaking its moneymaker, the Melissa computer virus tempts recipients into opening a document with an e-mail message like â€Å"Here is that document you asked for, don't show it to anybody else. † Once activated, the virus repli cates itself and sends itself out to the top 50 people in the recipient's e-mail address book.The virus spread rapidly after Smith unleashed it on the world. The United States federal government became very interested in Smith's work — according to statements made by FBI officials to Congress, the Melissa virus â€Å"wreaked havoc on government and private sector networks† [source: FBI]. The increase in e-mail traffic forced some companies to discontinue e-mail programs until the virus was contained. After a lengthy trial process, Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization [source: BBC].Ultimately, the Melissa virus didn't cripple the Internet, but it was one of the first computer viruses to get the public's attention. Flavors of Viruses In this article, we'll look at several different kinds of computer viruses. Here's a quick guide to what we' ll see: †¢ The general term computer virus usually covers programs that modify how a computer works (including damaging the computer) and can self-replicate. A true computer virus requires a host program to run properly — Melissa used a Word document. †¢ A worm, on the other hand, doesn't require a host program.It's an application that can replicate itself and send itself through computer networks. †¢ Trojan horses are programs that claim to do one thing but really do another. Some might damage a victim's hard drive. Others can create a backdoor, allowing a remote user to access the victim's computer system. Next, we'll look at a virus that had a sweet name but a nasty effect on its victims. Worst Computer Virus 9: ILOVEYOU A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm — it was a standalone program capable of replicating itself.It bore the n ame ILOVEYOU. [pic] Robyn Beck/AFP/Getty Images A screenshot of the ILOVEYOU computer virus The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU. TXT. vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting [source: McAfee].According to anti-virus software producer McAfee, the ILOVEYOU virus had a wide range of attacks: †¢ It copied itself several times and hid the copies in several folders on the victim's hard drive. †¢ It added new files to the victim's registry keys. †¢ It replaced several different kinds of files with copies of itself. †¢ It sent itself through Internet Relay Chat clients as well as e-mail. †¢ It downloaded a file called WIN-BUGSFIX. EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.Who created the ILOVEYOU virus? Some think it was Onel de Guzman of the Philippines. Filipino authorities investigated de Guzman on charges of theft — at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages [source: Landler]. Gotcha! As if viruses, worms and Trojan horses weren't enough, we also have to worry about virus hoaxes.These are fake viruses — they don't actually cause any harm or replicate themselves. Instead, the creators of these viruses hope that people and media companies treat the hoax as if it were the real deal. Even though these hoaxes aren't immediately dangerous, they are still a problem. Like the boy who cried wolf, hoax viruses can cause people to ignore warnings about real threats. Now that the love fest is over, let's take a look at one of the most widespread viruses to hit the Web. Worst Computer Virus 8: The Klez Virus [pic] Joe Raedle/Getty Images Fortunately for consumers, there's no shortage of antivirus software suites on the market.The Klez virus marked a new direction for computer viruses, setting the bar high for those that would follow. It debuted in late 2001, and variations of the virus plagued the Internet for several months. The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book. Some variations of the Klez virus carried other harmful programs that could render a victim's computer inoperable. Depending on the version, the Klez virus could act like a normal computer virus, a worm or a Trojan horse.It coul d even disable virus-scanning software and pose as a virus-removal tool [source: Symantec]. Shortly after it appeared on the Internet, hackers modified the Klez virus in a way that made it far more effective. Like other viruses, it could comb through a victim's address book and send itself to contacts. But it could also take another name from the contact list and place that address in the â€Å"From† field in the e-mail client. It's called spoofing — the e-mail appears to come from one source when it's really coming from somewhere else. Spoofing an e-mail address accomplishes a couple of goals.For one thing, it doesn't do the recipient of the e-mail any good to block the person in the â€Å"From† field, since the e-mails are really coming from someone else. A Klez worm programmed to spam people with multiple e-mails could clog an inbox in short order, because the recipients would be unable to tell what the real source of the problem was. Also, the e-mail's recip ient might recognize the name in the â€Å"From† field and therefore be more receptive to opening it. Antivirus Software It's important to have an antivirus program on your computer, and to keep it up to date.But you shouldn't use more than one suite, as multiple antivirus programs can interfere with one another. Here's a list of some antivirus software suites: †¢ Avast Antivirus †¢ AVG Anti-Virus †¢ Kaspersky Anti-Virus †¢ McAfee VirusScan †¢ Norton AntiVirus Several major computer viruses debuted in 2001. In the next section, we'll take a look at Code Red. Worst Computer Virus 7: Code Red and Code Red II [pic] Chris Hondros/Getty Images The CERT Coordination Center at Carnegie-Mellon university published an advisory alerting the public to the dangers of the Code Red virus. The Code Red and Code Red II worms popped up in the summer of 2001.Both worms exploited an operating system vulnerability that was found in machines running Windows 2000 and Windo ws NT. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House. That means all the computers infected with Code Red tried to contact the Web servers at the White House at the same time, overloading the machines.A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That's because the worm creates a backdoor into the computer's operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it's bad news for the computer's owner. The person behind the virus can access information from the victim's computer or even use the infected computer to commit crimes. That means the victim not only has to deal with an infected computer, but also may fall under suspicion for crimes he or she didn't commit.While Windows NT machines were vulnerable to the Code Red worms, the viruses' effect on these machines wasn't as extreme. Web servers running Windows NT might crash more often than normal, but that was about as bad as it got. Compared to the woes experienced by Windows 2000 users, that's not so bad. Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. Once patched, the original worms could no longer infect a Windows 2000 machine; however, the patch didn't remove viruses from infected computers — victims had to do that themselves.What do I do now? What should you do if you find out your computer has been hit with a computer virus? That depends on the virus. Many antivirus programs are able to remove viruses from an infected system. But if the virus has damaged some of your files or data, you'll need to restore from backups. It's very important to back up your inform ation often. And with viruses like the Code Red worms, it's a good idea to completely reformat the hard drive and start fresh. Some worms allow other malicious software to load onto your machine, and a simple antivirus sweep might not catch them all.Worst Computer Virus 6: Nimda [pic] SMobile Systems The Symbian Skull Virus affects cell phones, causing them to display a series of skull images like this. Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks [source: Anthes]. The Nimda worm's primary targets were Internet servers.While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time. The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer's functions.On the other hand, if the victim was the administrator for the machine, the attacker would have full control. The spread of the Nimda virus caused some network systems to crash as more of the system's resources became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS) attack. Phoning it In Not all computer viruses focus on computers. Some target other electronic devices. Here's just a small sample of some highly portable viruses: †¢ CommWarrior attacked smartphones running the Symbian operating system (OS). The Skulls Virus also attacked Symbian phones and displayed screens of skulls instead of a home page on the victims' phones. †¢ RavMonE. exe is a virus that could infect iPod MP3 devices made between Sept. 12, 2006, and Oct. 18, 2006. †¢ Fox News reported in March 2008 that some electronic gadgets leave the factory with viruses pre-installed — these viruses attack your computer when you sync the device with your machine [source: Fox News]. Next, we'll take a look at a virus that affected major networks, including airline computers and bank ATMs. Worst Computer Virus 5: SQL Slammer/Sapphire pic] Chung Sung-Jun/Getty Images The Slammer virus hit South Korea hard, cutting it off from the Internet and leaving Internet cafes like this one relatively empty. In late January 2003, a new Web server virus spread across the Internet. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank o f America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.The culprit was the SQL Slammer virus, also known as Sapphire. By some estimates, the virus caused more than $1 billion in damages before patches and antivirus software caught up to the problem [source: Lemos]. The progress of Slammer's attack is well documented. Only a few minutes after infecting its first Internet server, the Slammer virus was doubling its number of victims every few seconds. Fifteen minutes after its first attack, the Slammer virus infected nearly half of the servers that act as the pillars of the Internet [source: Boutin].The Slammer virus taught a valuable lesson: It's not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn't widely known. While it's still impo rtant to try and head off viruses before they hit you, it's also important to have a worst-case-scenario plan to fall back on should disaster strike. A Matter of Timing Some hackers program viruses to sit dormant on a victim's computer only to unleash an attack on a specific date.Here's a quick sample of some famous viruses that had time triggers: †¢ The Jerusalem virus activated every Friday the 13th to destroy data on the victim computer's hard drive †¢ The Michelangelo virus activated on March 6, 1992 — Michelangelo was born on March 6, 1475 †¢ The Chernobyl virus activated on April 26, 1999 — the 13th anniversary of the Chernobyl meltdown disaster †¢ The Nyxem virus delivered its payload on the third of every month, wiping out files on the victim's computer Computer viruses can make a victim feel helpless, vulnerable and despondent.Next, we'll look at a virus with a name that evokes all three of those feelings. Worst Computer Virus 4: MyDoom [pi c] Alex Wong/Getty Images The MyDoom virus inspired politicians like U. S. Senator Chuck Schumer to propose a National Virus Response Center. The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus — there have been several variants — had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 2, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec]. Later that year, a second outbreak of the MyDoom virus gave several search engine companies grief. Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication process. But it would also send a search request to a search engine and use e-mail addresses found in the search results. Eventually, searc h engines like Google began to receive millions of search requests from corrupted computers.These attacks slowed down search engine services and even caused some to crash [source: Sullivan]. MyDoom spread through e-mail and peer-to-peer networks. According to the security firm MessageLabs, one in every 12 e-mail messages carried the virus at one time [source: BBC]. Like the Klez virus, MyDoom could spoof e-mails so that it became very difficult to track the source of the infection. Oddball Viruses Not all viruses cause severe damage to computers or destroy networks. Some just cause computers to act in odd ways. An early virus called Ping-Pong created a bouncing ball graphic, but didn't seriously damage the infected computer.There are several joke programs that might make a computer owner think his or her computer is infected, but they're really harmless applications that don't self-replicate. When in doubt, it's best to let an antivirus program remove the application. Next, we'll ta ke a look at a pair of viruses created by the same hacker: the Sasser and Netsky viruses Worst Computer Virus 3: Sasser and Netsky [pic] David Hecker/AFP/Getty Images Sven Jaschan, creator of the Sasser and Netsky viruses, leaves the Verden Court. Sometimes computer virus programmers escape detection.But once in a while, authorities find a way to track a virus back to its origin. Such was the case with the Sasser and Netsky viruses. A 17-year-old German named Sven Jaschan created the two programs and unleashed them onto the Internet. While the two worms behaved in different ways, similarities in the code led security experts to believe they both were the work of the same person. The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems.It contacted those systems and instructed them to download the virus. The virus would scan ran dom IP addresses to find potential victims. The virus also altered the victim's operating system in a way that made it difficult to shut down the computer without cutting off power to the system. The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment [source: CERT]. As it spreads, it can cause a denial of service (DoS) attack as systems collapse while trying to handle all the Internet traffic.At one time, security experts at Sophos believed Netsky and its variants accounted for 25 percent of all computer viruses on the Internet [source: Wagner]. Sven Jaschan spent no time in jail; he received a sentence of one year and nine months of probation. Because he was under 18 at the time of his arrest, he avoided being tried as an adult in German courts. Black Hats Just as you'd find good and bad witches in Oz, you can find good and bad hackers in our world. One common term for a hacker who sets out to cre ate computer viruses or compromise system security is a black hat.Some hackers attend conventions like the Black Hat conference or Defcon to discuss the impact of black hats and how they use vulnerabilities in computer security systems to commit crimes. So far, most of the viruses we've looked at target PCs running Windows. But Macintosh computers aren't immune to computer virus attacks. In the next section, we'll take a look at the first virus to commit a Mac attack. Worst Computer Virus 2: Leap-A/Oompa-A [pic] Kevin Mazur Archive 1/WireImage/Getty Images We can thank â€Å"Weird Al† Yankovic for warning us of the dreaded â€Å"Stinky Cheese† virus.Maybe you've seen the ad in Apple's Mac computer marketing campaign where Justin â€Å"I'm a Mac† Long consoles John â€Å"I'm a PC† Hodgman. Hodgman comes down with a virus and points out that there are more than 100,000 viruses that can strike a computer. Long says that those viruses target PCs, not Mac comp uters. For the most part, that's true. Mac computers are partially protected from virus attacks because of a concept called security through obscurity. Apple has a reputation for keeping its operating system (OS) and hardware a closed system — Apple produces both the hardware and the software.This keeps the OS obscure. Traditionally, Macs have been a distant second to PCs in the home computer market. A hacker who creates a virus for the Mac won't hit as many victims as he or she would with a virus for PCs. But that hasn't stopped at least one Mac hacker. In 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list.The message contains a corrupted file that appears to be an innocent JPEG image. The Leap-A virus doesn't cause much harm to computers, but it does show that even a Mac computer can fall prey to malicious software. As Mac computers become more popular, we'll probably see more hackers create customized viruses that could damage files on the computer or snarl network traffic. Hodgman's character may yet have his revenge. Breaking into Song While computer viruses can pose a serious threat to computer systems and Internet traffic, sometimes the media overstates the impact of a particular virus.For example, the Michelangelo virus gained a great deal of media attention, but the actual damage caused by the virus was pretty small. That might have been the inspiration for the song â€Å"Virus Alert† by â€Å"Weird Al† Yankovic. The song warns listeners of a computer virus called Stinky Cheese that not only wipes out your computer's hard drive, but also forces you to listen to Jethro Tull songs and legally change your name to Reggie. We're down to the end of the list. What computer virus has landed the number one spot? Worst Computer Viru s 1: Storm WormThe latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer security experts first identified the worm. The public began to call the virus the Storm Worm because one of the e-mail messages carrying the virus had as its subject â€Å"230 dead as storm batters Europe. † Antivirus companies call the worm other names. For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. This might sound confusing, but there's already a 2001 virus called the W32. Storm. Worm. The 2001 virus and the 2006 worm are completely different programs. [pic] Gabriel Bouys/AFP/Getty ImagesProfessor Adi Shamir of the Weizmann Institute of Sciences in Israel is the leader of the Anti-Spyware Coalition. The Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet. Many versions of the Storm Worm fool the victim into downloading the application through fake links to news stories or videos.The people behind the attacks will often change the subject of the e-mail to reflect current events. For example, just before the 2008 Olympics in Beijing, a new version of the worm appeared in e-mails with subjects like â€Å"a new deadly catastrophe in China† or â€Å"China's most deadly earthquake. † The e-mail claimed to link to video and news stories related to the subject, but in reality clicking on the link activated a download of the worm to the victim's computer [source: McAfee]. Several news agencies and blogs named the Storm Worm one of the worst virus attacks in years.By July 2007, an official with the security company Postini claimed that the firm detected more than 200 million e-mails carrying links to the Storm Worm during an attack that spanned several days [source: Gaudin]. Fortunately, not every e-mail led to someone downloading the worm. Although the Storm Worm is widespread, it's not the most difficult virus to detect or remove from a computer system. If you keep your antivirus software up to date and remember to use caution when you receive e-mails from unfamiliar people or see strange links, you'll save yourself some major headaches. MalwareComputer viruses are just one kind of malware. Other types include spyware and some kinds of adware. Spyware spies on what a user does with his or her computer. That can include logging keystrokes as a way to discover login codes and passwords. Adware is a software app that displays ads to users while they use a larger application like a Web browser. Some adware contains code that gives advertisers extensive access to private information. Want to learn more about computer viruses? Take a look at the links on the next page, if you dare. COMPUTER VIRUSES Markus Hanhisalo Department of Computer ScienceHelsinki University of Technology Markus. [email  protected] fi This report briefly introduces computer viruses and how they effect network security. I have introduced today's virus situation. Many people are afraid of viruses, mostly because they do not know much about them. This report will guide you in the event of a virus infection. Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems. [pic] Table of Contents 1. Introduction to computer viruses 2. General information about computer viruses . 1 Different Malware types 2. 1. 1 Viruses 2. 1. 2 Trojan 2. 1. 3 Worms 2. 2 Macro viruses 2. 3 Virus sources 2. 3. 1 Why do people write and spread viruses? 2. 4 How viruses act 2. 4. 1 How viruses spread out 2. 4. 2 How viruses activate 2. 5 Viruses in different platforms 2. 5. 1 PC viruses 2. 5. 2 Macinto sh viruses 2. 5. 3 Other platforms 3. How to deal with viruses 3. 1 What are the signs of viruses 3. 2 What to do when you find viruses 4. How to protect from viruses 4. 1 How to provide against viruses 4. 2 Different anti-virus programs 5. Computer viruses in Finland 5.   Ã‚  Ã‚   A questionnaire survey in Finland about viruses 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland 6. How computer viruses have spread out around the world 7. Computer viruses and network security 8. Conclusions [pic] 1. Introduction to Computer Viruses The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened.The next thing usually the person whose computer might be infected with virus, panics. The person might think t hat all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick?They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site.There w as a time when people were able to be sure that some sites we secure, that those secure sites did not have any virus problems, but nowadays the people can not be sure of anything. There has been viruses even in Microsoft's download sites. In this report I am going to introduce different malware types and how they spread out and how to deal with them. Most common viruses nowadays are macro viruses and I am going to spend a little more time with them. I am going to give an example of trojan horses stealing passwords. 2. General information about computer viruses 2. 1 Different malware typesMalware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs [1]. 2. 1. 1  Ã‚  Ã‚   Viruses A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses: bo ot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system.The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. [2] Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses. 2. 1. 2  Ã‚  Ã‚   Trojan A Trojan Horse is a program that does something else that the user thought it would do.It is mostly done to someone on purpose. The Trojan Horses are usually masked so that they look interesting, for example a saxophone. wav f ile that interests a person collecting sound samples of instruments. A Trojan Horse differs from a destructive virus in that it doesn't reproduce. There has been a password trojan out in AOL land (the American On Line). Password30 and Pasword50 which some people thought were wav. files, but they were disguised and people did not know that they had the trojan in their systems until they tried to change their passwords. 9] According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands. 2. 1. 3  Ã‚  Ã‚   Worms A worm is a program which spreads usually over network connections. Unlike a virus which attach itself to a host program, worms always need a host program to spread. In practice, worms are not normally associated with one person computer systems. They are mostly found in multi-user systems such as Unix environments. A classic example of a worm is Robert Morrisis Internet-worm 1988. [1,5] [pic] Picture 1  Ã‚  Ã‚   An example of a worm. . 2 Macro virus Macro viruses spread from applications which use macros. The macro viruses which are receiving attention currently are specific to Word 6, WordBasic and Excel. However, many applications, not all of them Windows applications, have potentially damaging and infective macro capabilities too. A CAP macro virus, now widespread, infects macros attached to Word 6. 0 for Windows, Word 6. 0. 1 for Macintosh, Word 6. 0 for Windows NT, and Word for Windows 95 documents. What makes such a virus possible is that the macros are created by WordBASIC and even allows DOS commands to be run.WordBASIC in a program language which links features used in Word to macros. A virus, named â€Å"Concept,† has no destructive payload; it merely spreads, after a document containing the virus is opened. Concept copies itself to other documents when they are saved, without affecting the contents of documents. Since then, however, other macro viruses have been discovered, and some of them contain destructive routines. Microsoft suggests opening files without macros to prevent macro viruses from spreading, unless the user can verify that the macros contained in the document will not cause damage.This does NOT work for all macro viruses. Why are macro viruses so successful? Today people share so much data, email documents and use the Internet to get programs and documents. Macros are also very easy to write. The problem is also that Word for Windows corrupts macros inadvertently creating new macro viruses. [pic] Picture 2  Ã‚  Ã‚   New macro virus by corruption [12] Corruption's also creates â€Å"remnant† macros which are not infectious, but look like viruses and cause false alarms. Known macro virus can get together and create wholly new viruses. [pic]Picture 3  Ã‚  Ã‚   Macro virus growth, July 1995 to May 1997 [12] There have been viruses since 1986 and macro viruses since 1995. Now about 15 percent o f virus are macro viruses. There are about 2. 000 macro viruses and about 11. 000 DOS viruses, but the problem is that macro viruses spreads so fast. New macro viruses are created in the work-place, on a daily basis, on typical end-user machines, not in a virus lab. New macro virus creation is due to corruption, mating, and conversion. Traditional anti-virus programs are also not good at detecting new macro viruses.Almost all virus detected in the Helsinki University of Technology have been macro viruses, according to Tapio Keihanen, the virus specialist in HUT. Before macro viruses it was more easy to detect and repair virus infections with anti-virus programs. But now when there are new macro viruses, it is harder to detect macro viruses and people are more in contact with their anti-virus vendor to detect an repair unknown macro viruses, because new macro viruses spread faster than new anti-virus program updates come up. 2. 3 Virus sources Viruses don not just appear, there is al ways somebody that has made it and they have own reason to so.Viruses are written everywhere in the world. Now when the information flow in the net and Internet grows, it does not matter where the virus is made. Most of the writers are young men. There are also few university students, professors, computer store managers, writers and even a doctor has written a virus. One thing is common to these writers, all of them are men, women do not waste their time writing viruses. Women are either smarter or they are just so good that never get caught. [1] 2. 3. 1 Why do people write and spread viruses? It is difficult to know why people write them.Everyone has their own reasons. Some general reasons are to experiment how to write viruses or to test their programming talent. Some people just like to see how the virus spreads and gets famous around the World. The following is a list from news group postings alt. comp. virus and tries to explain why people write and spread viruses. ?   they don't understand or prefer not to think about the consequences for other people ? they simply don't care ?   they don't consider it to be their problem if someone else is inconvenienced ? hey draw a false distinction between creating/publishing viruses and distributing them ? they consider it to be the responsibility of someone else to protect systems from their creations ? they get a buzz, acknowledged or otherwise, from vandalism ? they consider they're fighting authority ? they like ‘matching wits' with anti virus vendors ? it's a way of getting attention, getting recognition from their peers and their names (or at least that of their virus) in the papers and the Wild List ? they're keeping the anti virus vendors in a job . 4 How viruses act Viruses main mission is to spread out and then get active. Some viruses just spread out and never activate. Viruses when they spread out, they make copies of self and spreading is harmful. 2. 4. 1  Ã‚  Ã‚   How viruses spread out Vi ruses mission is to hop from program to other and this should happen as quickly as possible. Usually viruses join to the host program in some way. They even write over part of the host program. A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network.These viruses spread normally via floppy disks which may come from virtually any source: ? unsolicited demonstration disks ? brand-new software ? disks used on your PC by salesmen or engineers ? repaired hardware A file virus infects other files, when the program to which it is attached is run, and so a file virus can spread across a network and often very quickly. They may be spread from the same sources as boot sector viruses, but also from sources such as Internet FTP sites and newsgroups. Trojan horses spread just like file viruses. A multipartite virus infects boot sectors and files.Often, an infected file is used to infect the boot sector: thus, this is one case where a boot sector infection could spread across a network. 2. 4. 2  Ã‚  Ã‚   How viruses activate We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things. Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files. As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit.So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses. There is also talk that viruses have done something to hardware like hard disk or monitor. Viruses can not do any harm to hardware but they can do harm to programs and for e xample to BIOS so that computer does not start after that. Usually you can start the computer from a boot diskette if the computer does not start otherwise. 2. 5  Ã‚  Ã‚   Viruses in different platforms 2. 5.   Ã‚  Ã‚   PC viruses Viruses are mostly written for PC-computers and DOS environment. Even though viruses are made for DOS environment, they are working also in Windows, Windows95, Windows NT and OS/2 operating systems. Some viruses like boot sector viruses, do not care what about operating systems. [1] 2. 5. 2  Ã‚  Ã‚   Macintosh viruses Macintosh viruses are not as a big problem as PC viruses are. There are not so many viruses in Macintosh operating system. Macintosh viruses has been found mostly from schools. How many Mac viruses there are? I found out that there are about 2-300 Mac-specific viruses.There are virtually no macro viruses which have a Mac-specific payload, but all macro viruses can infect on Macs and other platforms which runs Word 6. x of better. 2. 5. 3  Ã‚  Ã‚   Other platforms Viruses can be found from in almost any kind of computer, such as HP calculators used by students like HP 48-calculators and old computers like Commodore 64 and Unix computers too. [1] In general, there are virtually no non-experimental UNIX viruses. There have been a few Worm incidents, most notably the Morris Worm,. the Internet Worm, of 1988. There are products which scan some Unix systems for PC viruses.Any machine used as a file server (Novell, Unix etc. ) can be scanned for PC viruses by a DOS scanner if it can be mounted as a logical drive on a PC running appropriate network client software such as PC-NFS. Intel-based PCs running Unix e. g. Linux, etc. can also be infected by a DOS boot-sector virus if booted from an infected disk. The same goes for other PC-hosted operating systems such as NetWare. While viruses are not a major risk on Unix platforms, integrity checkers and audit packages are frequently used by system administrators to detect fi le changes made by other kinds of attack. . How to deal with viruses 3. 1  Ã‚  Ã‚   What are the signs of viruses Almost anything odd a computer may do, can blamed on a computer â€Å"virus,† especially if no other explanation can readily be found. Many operating systems and programs also do strange things, therefore there is no reason to immediately blame a virus. In most cases, when an anti-virus program is then run, no virus can be found. A computer virus can cause unusual screen displays, or messages – but most don't do that. A virus may slow the operation of the computer – but many times that doesn't happen.Even longer disk activity, or strange hardware behavior can be caused by legitimate software, harmless â€Å"prank† programs, or by hardware faults. A virus may cause a drive to be accessed unexpectedly and the drive light to go on but legitimate programs can do that also. One usually reliable indicator of a virus infection is a change in the le ngth of executable (*. com/*. exe) files, a change in their content, or a change in their file date/time in the Directory listing. But some viruses don't infect files, and some of those which do can avoid howing changes they've made to files, especially if they're active in RAM. Another common indication of a virus infection is a change to the reassignment of system resources. Unaccounted use of memory or a reduction in the amount normally shown for the system may be significant. In short, observing â€Å"something funny† and blaming it on a computer virus is less productive than scanning regularly   for potential viruses, and not scanning, because â€Å"everything is running OK† is equally inadvisable. 3. 2  Ã‚  Ã‚   What to do when you find viruses First thing what you should do when you find virus is count to ten and stay cool.You should keep notes on what you do and write down what your virus programs and you computer tells you. If you are not sure what to do, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm. Second,make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs knows what different viruses does and you can ether call them and ask about that viruses or you can go to their web pages and read about the virus you have.When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too. [6] It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup. It is good to let you administrator to know about the virus, so viruses would not spread around so much. I n TKK PC classes are protected by anti-virus program and that virus program reports to a person, responsible for virus protection. . How to protect from viruses 4. 1  Ã‚  Ã‚   How to provide against viruses Best way to protect yourself is to prepare your computer against viruses in advance. One way to protect you computer is to use updated anti-virus program. When you get an email attachment, you should first check the attachment by checking the file with a anti-virus program. As an example in one unnamed Finnish company all information was mailed in email attachments. There was this one Word document that was mailed to everybody. That email attachment was infected by a macro virus.Everyone got the infected attachment and those who opened that attachment by Word got that CAP-macro virus. After all there were a few thousand infections. It took lots of time and money to clear that virus. One can protect the computer against boot sector viruses by setting the BIOS to start from a har d disk rather than from a floppy disk. Write protection is a good way to prohibit against viruses. Write protection works well in floppy disks, Windows NT and UNIX, but not that well in Windows and Windows95. 4.   Ã‚  Ã‚   Different anti-virus programs There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions. [7] There are over ten good anti-viral programs. Most knows programs are Data Fellows F-Prot, EliaShim ViruSafe, ESaSS ThunderBYTE, IBM AntiVirus, McAfee Scan, Microsoft Anti-Virus, Symantec Norton AntiVirus and S&S Dr Solomon's AVTK.On a day-to-day basis, the average corporation should be very interested in the scan time; these impact strongly the users, who should be scanning hard drives and disks on a daily basis. If a product takes too long to carry out these basic tas ks, users will be unwilling to wait, and will stop using it. This is clearly undesirable – the perfect anti-virus product would be one which takes no time to run and finds all viruses. 5. Computer viruses in Finland 5. 1  Ã‚  Ã‚   A questionnaire in Finland about viruses Computer viruses are not uncommon in Finland, especially not in schools and universities. Virus prevention was not well organized in some organizations and tended to be better in government organizations than in local government or in firms† writes Marko Helenius in his Computer viruses in Finland report. He did a large scale questionnaire survey in Finland in the summer 1993. There were not macro viruses at that time yet, so today the virus situation is a bit different, but some results were pretty interesting. The knowledge of viruses was quite poor in all sectors: government, local authorities and companies. Respondents' knowledge of viruses was best in government organizations.How importance is vi rus prevention? The most positive attitude to virus prevention was in government organizations. 90% of the government organizations used some kind of anti-virus program, the same in local authority organizations was about 55 % and in companies it was over 60 %. [3] 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland There is a new government bill about writing and spreading viruses. If the bill goes through, it is going to be a criminal act to make and spread viruses in Finland and one could get two years in prison or a fine, if one spread or write viruses.If a person make a virus it would be same thing in court than a person were planning to burn something. It is criminal to make viruses in England, Italy, Netherlands, Switzerland and Russia. It is not punished to make or spread viruses in Finland, according today's penal code. If viruses make harm to somebody that could be punished. Nobody has been punished for that in Finland, even though some Finns has m ade viruses, for example Finnish Spryer. That virus formatted about 600 hard disks and did lots of damage. They say that it was made in Espoo, but they never got the persons that made that virus.Virus business in Finland is pretty big. Businesses that have specialized in viruses have about 100 million in sales together. It costs money to stop working and clean up the viruses. Computer viruses put in danger general safety, says Pihlajamaki from Ministry of Justice. It is dangerous if viruses gets to programs that control trains or airplanes. Computer viruses can also be used as a weapon. It is sad that America used computer viruses to slay and to make Iraq's computers non-functional. [4] 6. How computer viruses have spread out around the world Computer viruses are a problem all over the world.The following picture tells us how many times people have accessed Data Fellows, a company that makes anti-virus program F-Prot, more than 1,672,846 per month[10]. It means that people are inter esting in virus information. One reason is that people have to deal with viruses. Viruses in not only a problem in Finland and USA, it is a problem around the world. [pic] Picture 4  Ã‚  Ã‚   Accesses per month Today's most common virus is the macro virus. Cap virus is one of the macro viruses. Last month there were 3100 Cap macro virus accesses during the last 30 days in Data Fellows.Next common virus was Join the Crew with 1171 accesses and third common was Pen pal Greetings with 895 accesses. [10] [pic] Picture 5  Ã‚  Ã‚   Twenty most accessed virus descriptions during the last 30 days 7. Computer viruses and network security Computer viruses are one network security problem. A few people when asked if computer viruses can cause network security problems answered as follows. Dave Kenney answered from National Computer Security Assoc: â€Å"There is one macro virus for MSWord that is received as an attachment to MS Mail messages. If a user has Word open, and double clicks to see the ontents of the attachment, MS Word and the open document is infected. Then the document is mailed to three other users listed in the original user's address book. † â€Å"The only information that is leaked is the thing you should be worried about, your password! The trojan sends an E-mail to the hackers fake name and then he has your account at his hands,† wrote CJ from American Online. â€Å"Rarely, a Word macro virus may accidentally pick up some user information and carry it along; we know of one case where a macro virus â€Å"snatched† an innocent user macro that contained a password, and spread it far outside the company where that happened.In the future, however, it is entirely possible that more network-aware viruses will cause significant network security problems,† wrote David Chess from IBM. Marko Helenius wrote from Virus Research Unit, that there has been some cases when hackers have used trojan horses to gain information. There is one example in one finnish corporation where some money were transferred illegally a year ago. There has been a trojan in the University of   Tampere too where the trojan pretend to be a host transfer program. The trojan saved users login name and password to hard disk. 8.Conclusions There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found. It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware.A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random dam age to data files. A trojan horse is not a virus because it doesn't reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks. Marco viruses spread from applications which use macros. Macro viruses spreads fast because people share so much data, email documents and use the Internet to get documents. Macros are also very easy to write.Some people want to experiment how to write viruses and test their programming talent. At the same time they do not understand about the consequences for other people or they simply do not care. Viruses mission is to hop from program to other and this can happen via floppy disks, Internet FTP sites, newsgroups and via email attachments. Viruses are mostly written for PC-computers and DOS environments. Viruses are not any more something that just programmers and computer specialist have to deal with. Today everyday users have to deal with viruses.