Académique Documents
Professionnel Documents
Culture Documents
Word Study 8:
B,A B C,D,E E E,D B B D C D,C,E anti-virus software backups bandwidth browser domain name encryption firewalls FTP GPS IRC D,E E A C B D A A E,D D,C E ISP hyperlink logic bomb pagers password router trigger routine Trojan URL Usenet XML
Writing 11:
Step 1: an infected .EXE file arrives as an email attachment. Step 2: the infected .EXE file is opened. Step 3: the computer is infected and used to spread the virus. Step 4: when first run, the virus may copy one .EXE file using the same file name but with the final character of the filename decreased by 1. Step 5: the copied file is then infected. Step 6: a WIN.INI entry maybe created to execute the infected file when the system starts up. Step 7: the copied executable infects other 32 bit .EXE files when run. Step 8: five minutes after the file is opened, the worm creates a .DAT file hidden on the hard disk, named after the machine name. Step 9: the worm uses mass mailing techniques to send itself to these addresses.
Writing 10:
Parallel implementation: it means that both systems run at the same time for a period. The advantage is that if the new system does not operate properly, the old system is available as a fallback. The disadvantage is that two systems have to be maintained. Phased implementation: it is when parts of the system are converted separately. This maybe done gradually or in groups. The advantage is that people can gradually get used to the new system and certain problems can be dealt with as they arise. The disadvantage is that this method is more complex and time-consuming. In addition, there may be problems of incompatibility between the old and the new systems. Pilot implementation: is when the new system is piloted in part of the company before extending it to the whole company. The advantage is that problems can be identified and solved before the new system is implemented throughout the company. The disadvantage is that it takes longer to introduce the new system.