Professional Documents
Culture Documents
Colegio Técnico Industrial José Elías Puyana
Colegio Técnico Industrial José Elías Puyana
Colegio Técnico Industrial José Elías Puyana
Contextualización:
Se busca la identificación, el afianzamiento y la aplicación de las temáticas vistas en clase de Ingles.
INSTRUCCIONES DE ACTIVIDAD
Ver el video, leer el texto del mismo video y desarrollar las actividades
Buscar y ver el video en youtube: 5 of the Worst Computer Viruses Ever Este
This episode of SciShow might make you a little paranoid about computer viruses and internet
security. But that’s probably a good thing. When we talk about a computer virus, we usually mean
any kind of code that’s designed to do harm and spread itself to more computers. They’re created by
malicious programmers who might want to use your computer to attack other targets, or make
money by stealing your personal information. They could also just be trying to see how far their
virus will spread. Different viruses can affect Windows, Mac, and Linux computers, and even the
data servers that keep companies, and the internet itself, running. Antivirus programs help, but
they can have trouble dealing with threats they’ve never seen before. Over the years, there have
been thousands and thousands of viruses spread online, and they’ve caused billions of dollars of
damage from lost productivity, wasted resources, and broken machines .A few dozen of those
viruses stand out, some spread especially quickly, or affected a lot of people, or created a ton of
damage all by themselves. Some did all of the above. Since a lot of viruses were very bad, in a lot of
different ways, it’s hard to pick out which ones were objectively the worst. But with that in mind,
here are 5 of those extra-destructive viruses. These are snip petsof code that changed the way people
thought about computer security, both the people designing the viruses, and the people trying to
protect against them. Say it’s May 1999.You’re an unsuspecting computer user who’s never gotten a
virus, let alone been trained to look for the signs that an email might be malicious. You get an email
from someone you know, with a subject line that says it’s an important message. The message
inside just says “Here's that document
you asked for ... don't show anyoneelse,” with a winking emoticon. The attachment is a word
document labeled “LIST.”So you click on it, because you’re curious… and a list of porn sites
2. The Melissa virus was a "macro" virus. What does that mean?
Melissa virus is a macrovirus that infects Microsoft Office documents. It is also known as W97M
3. Most of these viruses spread through a combination of keen computer programing, and
social engineering. Give an example of how one of these viruses was socially engineered to
spread.
When opening or executing files downloaded from the Internet (programs, multimedia content,
documents, etc.), you must be cautious as they can bring some type of malware camouflaged.
What we download through file sharing programs (P2P) or obtain from content download web pages, as
they may be more likely to contain viruses
Evaluación: