Makalah Bahasa Inggris 3

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

The term computer virus was first used by Fred Cohen in his paper entitled 'Computer Viruses - Theory

and Experiments' in quotation 1984. Virus computer definition given by Cohen in the paper: Thus, according to the definition given above we can underline some nature of computer virus that is: have the ability to infect (infects) other programs and spreads. Basically due to the use of viral isitlah similarities in character between a computer virus with a virus that we know in the physical world. Where both have two goals: to survive and reproduce. Basically a computer virus can be classified into two types. Type the first computer virus was made for the purpose of research and study, and not made public. While the second type which is the opposite of the first type, is a dangerous computer virus computer systems in general, often referred to as virus 'in the wild'. For more details, let us know the contents of this paper. This paper discusses about some things related to computer viruses, namely the definition of computer viruses, the workings of a computer virus, types of computer viruses and how to cope with computer viruses.

Computer Virus Definition A computer virus is a computer program that duplicates or duplicate themselves by inserting a copy or copies of itself to the storage medium / document and into the network secretly without the knowledge of the user's computer. The effects of computer viruses are very diverse ranging from only appear strange messages to damage the computer and delete files or our documents. Computer viruses can be analogous to a biological virus that spreads by inserting itself into living cells. Computer viruses can be destructive (for example by corrupting the data on the document), make computer users feel disturbed, and no effect at all.
Characteristics of a computer virus infected computers are as follows: -

The computer is running slower than normal Frequent out error messages or odd-odd Changes the display on a computer Storage media such as floppy disks, flash, and so on directly copying the files weird without our coffee when we connect to the computer. The computer restarts itself like or crashes while it is running. Like the message or writing strange The computer hangs or stops responding to us. Hard disk can not be accessed Printers and other devices can not be used even though no hardware problems and software drivers. Often there is a menu or dialog box that error or damaged. Loss of some basic computer functions. The computer attempts to connect to the internet or a network without being told. Files that we store on computers or storage media away or hidden viruses. and others.

STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

Sample forms of media spread of computer viruses from one computer to another computer: - Storage media (floppy, flash, external hard disk, zipdisk, CD, DVD, blurry disc, cartridge, etc.) - The network LAN, MAN, WAN, the internet and so forth. - File attachment or a file attachment in email or other electronic messages. - File software (software) virus-ridden computer. The most effective way that we are not exposed to computer viruses is to install computer programs which are original or not original, not pirated a virus ridden and friends, do not connect your computer to the network or the internet, and never open or execute files from the computer other. But way too extreme and less slang in everyday computer use because usually we do the exchange of data or files with another computer in the form of job files, image files, file attachments, music files, video files, and so forth. So to avoid our computer got a virus infected and then we must be vigilant in its interaction with the file from another computer, the files from storage media from others, email attachments, file exchange network, our computer security holes, and others. Attach a good antivirus that is updated regularly to network and firewall program and anti spyware and adware to tackle other types of computer trouble. How it works Computer viruses generally can damage computers and software can not directly damage the computer hardware but can lead to damage in a way that forces the program to load over process to a particular device. Negative effects of computer viruses is to multiply them selves, which makes the computer resources (such as memory usage) to be reduced significantly. Nearly 95% of virus-based computer operating system Windows. The rest attacked the GNU / Linux, Mac, FreeBSD, OS / 2 IBM, and Sun Operating System. Malignant viruses that will damage the hardware. Type of computer viruses A computer virus is a general term to describe any kind of attack against computers. Categorized by the way it works, computer viruses can be grouped into the following categories: Worm : This makes computer resources (hard drive) into it's full of worms. Worm is a potential security weaknesses or loopholes in our computer that allows our computers infected with viruses without having to execute a file that usually occur on the network. Trojans : Capture data on infected computers and sends it to the trojan maker itself. Trojan is a program that allows our computer controlled others over a network or the Internet. Backdoor : Almost the same as the trojan. However, Backdoor usually resembles the files just fine. For example games. Spyware : Virus that monitors the infected computer. Spyware is an application that leaked the data or information habits of user behavior in using computers to outside parties without us knowing it. Typically used by the party advertisers. Rogue : a program that mimics an antivirus program and displays antiviral activity as normal, and giving false warnings about the virus. The aim is that users purchase and activate the fake antivirus program and make money for the rogue virus makers. Also rogue can open security holes in computers in order to bring in other viruses.
STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

Root kits ; The virus that works like an ordinary computer systems work only. Metamorphic viruses : viruses that change the encoding itself to be more difficult to detect. Mobile Viruses : Viruses that run on mobile phones, and can cause various effects, ranging from cell phones damage, steal data in mobile phones, to make calls discreetly and spent toll of cell phone users. The following names / types of viruses and how to work each virus: 1. Virus File This virus has infected the workings of the application or any documents in your computer. When an infected application is run, the virus will spread in a way infect all files or documents that are accessed by the application. 2. Boot Sector Virus These viruses have a way of working that is infecting the hard disk boot sector (boot sector is an area in the hard drive is accessed when the computer is first turned on). If a boot sector virus is active, users will not be able to boot the computer normally. 3. E-mail Viruses These viruses have a way of working that is spread through e-mail (usually in the form of attached files / attachments). If the virus is active, then he will send itself to the various names of e-mail address contained in the user's address book. 4. Multipartite Virus These viruses have a way of working that infects computer files on the hard disk boot sector as well. This type of virus will cause many problems because it causes fatal damage. 5. Polymorphic viruses This virus has a unique way of working that this virus can change the code itself (change form) while spreading itself to other computers. Type virus is more difficult to detect because it has such properties. 6. Virus Stealth (stealth virus) These viruses have a way of working that he was able to hide himself by making an infected file as if the file is not infected. 7. Macro Viruses These viruses have a way of working that infects Microsoft Office applications, like Word and Excel. Documents are usually infected by Macro viruses will modify the existing command in Microsoft Office as the "Save" to spread it self when the command is executed.

How to cope computer viruses


Virus attacks can be prevented or overcome by using antivirus software. This type of software can also detect and remove computer viruses. Computer viruses can be removed with a database (database / Signature-based detection), heuristics, or rank of the program itself (Quantum).
STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

Symptoms of the virus infected computer: Computer running really slow like a zombie. Suddenly without a signal ABA silence and no response. Blue screen or crash and then restart. CDROM, Hard Drive, Floppy and USB drives can not be accessed Display user interface changes 6. Input devices like keyboard or mouse can not be in control
1. 2. 3. 4. 5.

Steps to address the problem of the virus if already infected 1. Exit the applications that are running and immediately turn off computer. 2. Unplug the hard drive that has been infected, perform the backup of critical data earlier. 3. Move the jumper to slave hard drive, then plug in other computers that have installed antivirus up-to-date. 4. Scan the hard drive infected with a virus 5. Disks in the clear of the virus, the test is functioning correctly. 6. If Step 5 fails, suggested formats and re-install the operating system because it is the safest way of elimination of the virus permanently.
A. Answer the following question! 1. what is computer virus? 2. What are the effects of computer viruses? 3. What are the three media spread of computer viruses?

4. What are the steps to address the problem of the virus if already infected?
B. Find the similar of these word ! Opposite, Secretly, Damage, Effect, Significantly, Attack, Discreetly, Infected C. Find the preposition, conjunction, verb and noun from the text above !

a. Computer viruses generally can damage computers and software can not directly damage the computer hardware but can lead to damage in a way that forces the program to load over process to a particular device. b. Computer viruses can be destructive (for example by corrupting the data on the document), make computer users feel disturbed, and no effect at all. c. Computer viruses can be removed with a database (database / Signature-based detection), heuristics, or rank of the program itself (Quantum).
D. Write your summarize not more than 150 word by your own word !

Answer : A. Answer

STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

1. A computer virus is a computer program that duplicates or duplicate themselves by inserting a copy or copies of itself to the storage medium / document and into the network secretly without the knowledge of the user's computer.

2. The effects of computer viruses are very diverse ranging from only appear strange messages to damage the computer and delete files or our documents.
3. The three media spread of computer viruses ;

- Storage media (floppy, flash, external hard disk, zipdisk, CD, DVD, blurry disc, cartridge, etc.) - The network LAN, WAN, MAN the internet and so forth. - File attachment or a file attachment in email or other electronic messages.

4. The step to address the problem of the virus if already infected ;


a. Exit the applications that are running and immediately turn off computer.

b. Unplug the hard drive that has been infected, perform the backup of critical data earlier. c. Move the jumper to slave hard drive, then plug in other computers that have installed antivirus up-to-date. d. Scan the hard drive infected with a virus. e. Disks in the clear of the virus, the test is functioning correctly. f. If Step 5 fails, suggested formats and re-install the operating system because it is the safest way of elimination of the virus permanently.

B. Answer
Opposite = different

Secretly Damage Effect Significantly Attack Discreetly


Infected

= at secret = to harm or spoil something = result = important = hurt = at discreet


= diseas

C. Answer No Preposition Conjunction Verb Noun

STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

In, over, to 1.

That,

Can, lead, load,

For, by, on, at, 2. With, 3.

And,

Can, be, corrupting, feel,

Computer, viruses, can, damage, software, hardware, a, way, forces, , process, particular, device. Computer viruses, example, data, document, users, effect

or,

Can, be, removed, Computer viruses, data base, signature, detection, rank, program,

D. Answer A computer virus is a computer program that duplicates or duplicate themselves by inserting a copy or copies of itself to the storage medium / document and into the network secretly without the knowledge of the user's computer. The effects of computer viruses are very diverse ranging from only appear strange messages to damage the computer and delete files or our documents. Sample forms of media spread of computer viruses from one computer to another computer: Storage media (floppy, flash, external hard disk, zipdisk, CD, DVD, blurry disc, cartridge, etc.), the network LAN, MAN, WAN, the internet and so forth, file attachment or a file attachment in email or other electronic messages, file software (software) virus-ridden computer. Steps to address the problem of the virus if already infected; first, exit the applications that are running and immediately turn off computer, unplug the hard drive that has been infected, perform the backup of critical data earlier, after that move the jumper to slave hard drive, then plug in other computers that have installed antivirus up-to-date, scan the hard drive infected with a virus, disks in the clear of the virus, the test is functioning correctly. If Step 5 fails, suggested formats and re-install the operating system because it is the safest way of elimination of the virus permanently.

STMIK ROYAL KISARAN KELAS SI-1B COMPUTER VIRUS

You might also like