Different Types of Poetry and Prose

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

DIFFERENT TYPES OF POETRY AND PROSE

ABC poem

Alexandrine Poetry Type

Allegory

Analogy Poetry Type

Ballad Poems

Ballade Poetry Types

Blank Verse

Burlesque Types

Cacophony

Canzone Poetry Type

Carpe diem

Cinquain Poetry Type

Classicism Types

Conceit Poetry Type

Couplet Poetry Type

Dactyl Poetry Type

Doggerel

Elegy

Enjambment

Epic Poems

Epigram

Epitaph

Epithalamium Form

Free Verse

Haiku Poetry Type

Idyll Poetry Types

Imagery Poems

Irony

Lay Poetry Types

Limericks

Lyric Poetry

Name Poem

Narrative Poetry

Odes

Pastoral Poetry Type

Quatrain Poetry Type

Refrain Poetry Type

Rhymes

Romanticism Type

Senryu Poetry Type

Rhyme Royal Type

Sonnets

Tanka

Terza rima

Verse

Prose and Prose Poetry

Submitted by
;JESSA G.ADDUN 9-GOLD
Submitted to:
MRS.REBECCA TABILAS

COMPUTER VIRUSES AND ITS EFFECTS TO THE USERS

TLE-ICT
GRADE 9-GOLD

MRS.MARRY ANN ESCALANTE


SUBMITTED TO:

JESSA G.ADDUN
SUBMITTED BY:

2015

COMPUTER VIRUSES AND ITS EFFECTS TO THE USERS

File infectors: This virus infects executable files or programs. On running the programs, the virus
would be activated, then be able to carry out its damaging effects.
Directory viruses: This virus alters the paths indicating a files location. In this case, when the
infected program is executed, you will be running the program unknowingly, since the virus has
moved the original program and file to another location. This they would be performed as single
actions. The user would therefore be saved the trouble of executing them singularly. therefore
makes it impossible to locate the moved files.

As the name indicates, the role of a file infector is to infect the files of a computer. This is one of
the most frequently deployed viruses and has been known to inflict considerable damage. Upon
running a program that has been corrupted by a file infector, the virus duplicates the malicious
code and applies it to other executable applications on the computer. Files that are the most
vulnerable to this type of infection bare the extensions of EXE. ( execute) and .COM
(command), though any file capable of execution can be infected. A popular example of the file
infector is the Cascade virus, an infection that has basically become obsolete. The original
variation of this virus was designed to deliver a payload from October 1st through December
31st in 1988. Upon execution, the characters on the victim's monitor descend and find
themselves piled at the bottom of the screen. The Cascade virus has spawned a number of
variants over the years, most of which have displayed the same basic function. A more recent
example of a file infector is the Cleevix virus, which is reported as being first discovered in
January of 2006. When executed, it seeks out the current directory, the system directory and the
Windows directory. It then infects all portable executable files within them. Because the
infection typically displays a message upon execution, it is fairly easy to detect. Other than
being equipped with a few encryption features, Cleevix as a rather simple virus that can be
removed with ease.

REACTION PAPER:

directory virus or directories (cluster) viruses


There is a type of virus known as a cluster virus that infects your files not by changing the file
or planting extra files but by changing the DOS directory information so that directory entries
point to the virus code instead of the actual program. When you run a program, DOS first loads
and executes the virus code, the virus then locates the actual program and executes it. Dir-2 is an
example of this type of virus.
The interesting thing about this type of virus is that even though every program on the disk may
be infected, because only the directory pointers are changed there is only one copy of the virus
on the disk.
This type of virus can cause serious problems if you dont know its there. While the virus is in
memory, it controls access to the directory structure on the disk. If you boot from a clean floppy
disk, however, and then run a utility such as SCANDISK the utility will report serious problems
with cross-linked files on your disk. Most such utilities will offer to correct the problem and
users, not knowing any better, often accept the offer. Unfortunately, in the case of this virus type,
if you accept the offer you will end up with all your executable files the same length and each
one will be the virus code. Your original programs will be lost.

You might also like