Professional Documents
Culture Documents
Different Types of Poetry and Prose
Different Types of Poetry and Prose
Different Types of Poetry and Prose
ABC poem
Allegory
Ballad Poems
Blank Verse
Burlesque Types
Cacophony
Carpe diem
Classicism Types
Doggerel
Elegy
Enjambment
Epic Poems
Epigram
Epitaph
Epithalamium Form
Free Verse
Imagery Poems
Irony
Limericks
Lyric Poetry
Name Poem
Narrative Poetry
Odes
Rhymes
Romanticism Type
Sonnets
Tanka
Terza rima
Verse
Submitted by
;JESSA G.ADDUN 9-GOLD
Submitted to:
MRS.REBECCA TABILAS
TLE-ICT
GRADE 9-GOLD
JESSA G.ADDUN
SUBMITTED BY:
2015
File infectors: This virus infects executable files or programs. On running the programs, the virus
would be activated, then be able to carry out its damaging effects.
Directory viruses: This virus alters the paths indicating a files location. In this case, when the
infected program is executed, you will be running the program unknowingly, since the virus has
moved the original program and file to another location. This they would be performed as single
actions. The user would therefore be saved the trouble of executing them singularly. therefore
makes it impossible to locate the moved files.
As the name indicates, the role of a file infector is to infect the files of a computer. This is one of
the most frequently deployed viruses and has been known to inflict considerable damage. Upon
running a program that has been corrupted by a file infector, the virus duplicates the malicious
code and applies it to other executable applications on the computer. Files that are the most
vulnerable to this type of infection bare the extensions of EXE. ( execute) and .COM
(command), though any file capable of execution can be infected. A popular example of the file
infector is the Cascade virus, an infection that has basically become obsolete. The original
variation of this virus was designed to deliver a payload from October 1st through December
31st in 1988. Upon execution, the characters on the victim's monitor descend and find
themselves piled at the bottom of the screen. The Cascade virus has spawned a number of
variants over the years, most of which have displayed the same basic function. A more recent
example of a file infector is the Cleevix virus, which is reported as being first discovered in
January of 2006. When executed, it seeks out the current directory, the system directory and the
Windows directory. It then infects all portable executable files within them. Because the
infection typically displays a message upon execution, it is fairly easy to detect. Other than
being equipped with a few encryption features, Cleevix as a rather simple virus that can be
removed with ease.
REACTION PAPER: