Back up! Back up your folders regularly

Physical file storage

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be formatted. The formatting process creates the equivalent of electronic storage bins by dividing a disk into tracks and then further dividing each track into sectors. Tracks and sectors are numbered to provide addresses for each data storage bin. The numbering scheme depends on the storage device and the operating system. On floppy, Zip, and hard disks, tracks are arranged as concentric circles; on CDs and DVDs, one or more tracks spiral out from the center of the disk.

To speed up the process of storing and retrieving data, a disk drive usually works with a group of sectors called a cluster or a “block”. The number of sectors that form a cluster varies, depending on the capacity of the disk and the way the operating system works with files. A file system's primary task is to maintain a list of clusters and keep track of which are empty and which hold data. This information is stored in a special index file. If your computer uses the FAT32 file system, for example, this index file is called the File Allocation Table (FAT). If your computer uses NTFS, it is called the Master File Table (MFT).

When you save a file, your PC’s operating system looks at the index file to see which clusters are empty. It selects one of these empty clusters, records the file data there, and then revises the index file to include the new file name and its location.

Comprehension check. Indicate the paragraph where the following ideas are found in the text.

1. It is preferable to maintain file extensions and not to store files in the root directory.

2. There is a slight difference between the Save option and the Save As option.

3. A special index file is required to keep track of a file’s location.

4. This program is related to the Windows operating system and exemplifies a file management utility.

5. The way to open and save a file on a specified storage medium depends on software applications.

6. Apart from locating files, it enables users to rename, copy, move and delete them.

Vocabulary practice

1. Match up the words that are opposite in meaning.

save distinct

empty display

additional include

subtle erase

hide basic

retrieve full

2. Fill in the blanks choosing out of the variants given.

1. To make storing and finding data fast, a disk drive deals with a … which is a group of sectors.

a) track b) bin c) cluster d) junction

2. You had better … cryptic abbreviations in files and folders.

a) give b) avoid c) access d) accept

3. You can avoid growing your list of files to an unmanageable size by … unnecessary files and folders.

a) saving b) deleting c) renaming d) moving

4. File … facilitates the process of organizing and manipulating your computer-based files.

a) location b) extension c) performance d) management

5. The operating system revises the index file to … the new file name and its location.

a) erase b) include c) number d) exclude

6. … a file is stored on a disk, CD, etc., the storage medium should be formatted.

a) before b) after c) while d) since

7. The pattern of … tracks and sectors is dependent on the storage medium and your PC’s operating system.

a) dividing b) selecting c) numbering d) arranging

3. Make three-word combinations using the words in columns and then fill in the gaps in the following sentences.

A: a) file B: sign C: option

b) save storage utility

c) master management table

d) data file bin

e) plus as icon

1. If you want to select a name and a storage device for a file, the … should be used.

2. … are designated addresses by numbering tracks and sectors.

3. A special … provided by the operating system helps you manage your files efficiently.

4. The … is used to display the next level of your computer’s hierarchy of storage devices and folders.

5. The … is the index file supported by the NTFS file system.

4. Fill in the gaps in the text.

File _1_ provides any procedure that can help you organize your computer-based files so that you can find and use them more _2_. File management uses tools provided with a software program to open and save files. Additional tools might enable you to _3_ new files and folders, rename files, and delete them. The Save and Save As _4_ boxes are examples of these file management tools.

Before a computer stores data on a disk, CD, or DVD, it creates the equivalent of electronic storage _5_ by dividing the disk into _6_, and then further dividing the disk into _7_. This dividing process is referred to as _8_. Each sector of a disk is numbered, providing a storage address that the operating system can track. Many computers work with a group of sectors, called a _9_, to increase the efficiency of file storage operations.

Speaking. Discuss the following questions.

1. What does file management mean?

2. How does a software application help users manage files?

3. What is the difference between the Save option and the Save As option?

4. What is the example of a file management utility?

5. What is Windows Explorer designed for?

6 What can be done with the files and folders that are listed in Windows Explorer?

7. What file management tips should be followed while manipulating files?

8. What does the formatting process involve?

9. What is a cluster?

10. Is a file system’s primary or secondary task to keep track of which clusters keep data and which clusters don’t?

11. How does the operating system use an index file to help you save a file?

Text C

Pre-reading.Match the meaning of the following English words with their Russian equivalents.

1. computer virus a) вирусная подпись
2. malicious code b) бот
3. boot sector virus c) компьютерный вирус
4. macro virus d) «Троянский конь»
5. trigger event e) переключающее (триггерное) событие
6. Trojan horse f) контрольная сумма
7. keylogger g) клавиатурный шпион
8. bot h) макровирус
9. antivirus software i) вирус сектора загрузки
10. checksum j) вредоносный код
11. virus signature k) антивирусное программное обеспечение

Reading.Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary.

Computer Viruses

Viruses are one of the biggest threats to the security of your computer files. In 1981, there was one known computer virus. Today, the count exceeds 100,000. Between 900 and 1,300 new viruses appear every month.

A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files. The term “computer virus” is often used to refer to any malicious code or software that invades a computer system. The term malicious code (sometimes called “malware”) refers to a program or set of program instructions designed to surreptitiously enter a computer and disrupt its normal work. Many types of malicious code, including viruses, worms, and Trojan horses, are created and unleashedby individuals referred to as “hackers” or “crackers”.

Viruses spread when people distribute infected files by exchanging disks and CDs, sending e-mail attachments, exchanging music on file-sharing networks, and downloading software from the Web. Many computer viruses infectfiles executed by your computer – files with extensions such as .exe, .com. or .vbs. When your computer executes an infected program, it also executes the attached virus instructions.

A virus can be classified as a file virus, boot sector virus, or macro virus. A file virus infects application programs, such as games. A boot sector virus infects the system files your computer uses every time you turn it on. These viruses can cause widespread damage to your computer files and recurring problems. A macro virus infects a set of instructions called a “macro” – a miniature program that usually contains legitimate instructions to automate document and worksheet production. When you view a document containing an infectedmacro, the macro virus duplicates itself into the general macro pool, where it is picked up by other documents. In addition to replicating itself, a virus might deliver a payload, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk. A trigger event, such as a specific date, can unleash some viruses. For example, the Michelangelo virus triggers on March 6, the birthday of artist Michelangelo.

A Trojan horse (sometimes simply called a “Trojan”) is a computer program that seems to perform one function while actually doing something else. Trojan horses are notorious for stealing passwords using a keylogger – a type of program that records your key-stroke.

Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent. Because an intelligent agent behaves somewhat like a robot, it is often called a bot. Like a spider in its web, the person who controls many bot-infested computers can link them together into a network called a botnet. Botnets as large as 400,000 computers have been discovered by security experts.

Malicious Code Trends

Date Threats Trends
Cloner The first known virus begins to spread. Cloner infects files on disks formatted for Apple II computers. The prevalence of disk-borne viruses continues well into the1990s with Jerusalem (1987), Michelangelo (1992), and others.  
Internet Worm The first major worm attack over the Internet sets the stage for today's prolific crop of mass-mailing worms.  
Back Orifice First Trojan horse designed to allow a remote hacker to gain unauthorized access to a computer.  
Melissa Macro viruses, such as Melissa and l.aroux, are prevalent for several years and cause trouble by infecting Microsoft Word and Excel files.  
Love Letter One of the fastest spreading mass-mailing worms. Followed by Sobig, Blaster, and MyDoom (2004).  
Code Red Worms designed for Denial of Service attacks gather steam. Code Red, which targeted the White House, is followed by Blaster (2001) and Slammer (2003).  
Klez Klez is a mass-mailing worm that is particularly difficult to eradicate. Because the “From” address is spoofed, it is almost impossible to locate infectedcomputers.  
2003Most notebook computers are equipped with several USB ports. Mimail   Social engineering takes center stage and users are confused by fake e-mails from seemingly legitimate companies, such as PayPal, Microsoft, and Wells Fargo.  
Sasser Netsky Xombe MyDoom, Zafi Bagle Worms, such as Sasser, begin to emerge that infect computers without user interaction, such as opening an infectede-mail attachment. Mass-mailing worms are still most prevalent. Worms that spread over instant messaging and handheld devices begin to emerge.  
Mytob Zotob Rbot Bots become one of the biggest security problems. Arriving as e-mail attachments, links embedded in e-mail messages, or from infected banner ads, bots install themselves on unprotected computers, which can then be controlled by unauthorized hackers and commandeered into botnets that launch spam and Denial of Service attacks.  

These are the top three steps you can take to prevent your computer from becoming infected:

- Use antivirus software on every computing device you own.

- Keep software patches and operating system service packs up to date.

- Do not open suspicious e-mail attachments.

Antivirus software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms. This essential software is available for handheld computers, personal computers, and servers. Popular antivirus software for personal computers includes McAfee VirusScan, Norton AntiVirus, and F-Secure Anti-Virus.

Antivirus software uses several techniques to find viruses. As you know, some viruses attach themselves to an existing program. The presence of such a virus often increases the length of the original program. The earliest antivirus software simply examined the programs on a computer and recorded their length. A change in the length of a program from one computing session to the next indicated the possible presence of a virus.

To counter early antivirus software, hackers became more cunning. They created viruses that insert themselves into unused portions of a program file without changing its length. Antivirus software developers fought back. They designed software that examines the bytes in an uninfected application program and calculates a checksum. A checksum is a number calculated by combining the binary values of all bytes in a file. Each time you run an application program, antivirus software calculates the checksum and compares it with the previous checksum. If any byte in the application program has changed, the checksum will be different, and the antivirus software assumes that a virus is present.

Today’s viruses, Trojan horses, bots, and worms are not limited to infecting program files, so modern antivirus software attempts to locate them by searching your computer’s files and memory for virus signatures. A virus signature is a section of program code, such as a unique series of instructions, that can be used to identify a known malicious program, much as a fingerprint is used to identify an individual.

Comprehension check. Choose the ending for each sentence from the two versions given.

1. Worm named Code Red was targeted at a) White House; b) Bank of Scotland.
2. Any program designed to enter a computer and disrupt its normal operations is called   a) malicious code; b) utility.  
3. Many types of malicious codes are created by a) the computer itself; b) individuals referred to as “hackers”.
4. A boot sector virus infects the system files your computer uses   a) every time you turn it on; b) when you are connected to the Internet.
5. A change in the length of a program from one computing session to the next a) indicated the possible presence of a virus; b) is a result of operation system work.
6. A checksum is a) a number calculated by combining the binary values of all bytes in a file; b) the cost of an antivirus program.

Vocabulary practice

1. Which word does not belong to the group?

a) virus, worm, Trojan horse, bot, file, botnet;

b) distribute, download, automate, infect, view, execute;

c) duplicates, instructions, infects, invades, behaves, spreads;

d) spider, programmer, hacker, user, server, developer;

e) individual, general, normal, personal, analytical, digital.

2. Fill in the blanks choosing from the variants given.

1. Does the term computer virus refer to any malicious code that … (makes up/invades) a computer system?

2. When your computer executes an infected program it … (executes/deletes) the attached virus instructions.

3. A trigger event, such as a specific date, can … (kill/destroy/unleash) some viruses.

4. Love letter is one of the … (slowest/fastest) spreading mass-mailing worms of all time.

5. Hackers created viruses that insert themselves into … (used/unused) portions of a program file without changing its length.

3. Transform the given sentences using the word(s) in brackets without any change in meaning.

1. A computer virus is a set of programs that attaches itself to a file (connecting).

2. If a document contains an infected macro, the macro virus duplicates itself into the general macro pool, where it is picked up by other documents (doubles, selected).

3. A virus might deliver a payload which could be both harmless and devastating (do no harm, corrupt).

4. Software that can automate a task when commanded to do so is called an intelligent agent (is able, is instructed).

5. A trigger event, such as a specific date, can unleash some viruses (particular, release).

6. Trojan horses are notorious for stealing passwords using a keylogger – a type of program that records your key-strokes (known, a sort).

4. Fill in the gaps in the text.

A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to the other files. You might encounter several types of viruses. A virus that attaches itself to an application program, such as a game utility, is known as a _1_ virus. A boot _2_ virus infects the system files your computer uses every time you turn it on. A _3_ virus infects a set of instructions that automates document and worksheet production.

A Trojan horse is a computer program that seems to perform one function while actually doing something else. Such programs are notorious for stealing _4_, although some delete files and cause other problems.

_5_ software can help prevent viruses from invading your computer system and can root out viruses that that take up residence. This software typically scans for a virus _6_ and is sometimes referred to as virus scanning software.

Speaking. Discuss the following questions.

1. What is a computer virus?

2. How do viruses spread?

3. Are there different kinds of viruses?

4. What is a Trojan horse? What is a bot?

5. What is a botnet?

6. How can you avoid viruses and worms?

7. What is antivirus software? How does it work?

Text D

Reading. Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary.

Data Backup

Backup and restore procedures

Have you ever mistakenly copied an old version of a document over a new version? Has your computer's hard disk drive gone on the fritz? Did a virus wipe out your files? Has lightning “fried” your computer system? These kinds of data disasters are not rare; they happen to everyone. You can’t always prevent them, so you need a backup plan that helps you recover data that's been wiped out by operator error, viruses, or hardware failures.

A backup is a copy of one or more files that has been made in case the original files become damaged. A backup is usually stored on a different storage medium from the original files. For example, you can back up files from your hard disk to a different hard disk, a writable CD or DVD, tape, floppy disk, or Web site.

A good backup plan allows you to restore your computing environment to its pre-disaster state with a minimum of fuss. Unfortunately, no single backup plan fitseveryone’s computing style or budget. You must devise your own backup plan that’s tailored to your particular computing needs.

A full-system backup contains a copy of every program, data, and system file on a computer. The advantage of a full-system backup is that you can easily restore your computer to its pre-disaster state simply by copying the backup files to a new hard disk. A full-system backup takes a lot of time, however, and automating the process requires a large-capacity tape backup device or a second hard disk drive.

A workable alternative to a full system backup is a “selective” backup that contains only your most important data files. The disadvantage of this backup strategy is that because you backed up only data files, you must manually reinstall all your software before restoring your data files.

If your strategy is to back up your important data files, the procedure can be simplified if you’ve stored all these files in one folder or its subfolders.

In addition to data files you create, a few other types of data files might be important to you. Consider making backups of these files:

- Internet connection information

- E-mail folders

- E-mail address book

- Favorite URLs

- Downloads

Windows users often hear a variety of rumors about backing up the Windows Registry. The Registry, as it is usually called, is an important group of files the Windows operating system uses to store configuration information about all the devices and software installed on a computer system.

As simple as it sounds, backing up the Registry can present a bit of a problem because the Registry is always open while your computer is on. Windows users whose backup plans encompass all files on the hard disk must make sure their backup software provides an option for including the Windows Registry.

Your backup schedule depends on how much data you can afford to lose. If you’re working on an important project, you might want to back up the project files several times a day. Under normal use, however, most people schedule a once-a-week backup. If you work with a To Do list, use it to remind yourself when it is time to make a backup.

Store your backups in a safe place. Don’t keep them at your computer desk because a fire or flood that damages your computer could also wipe out your backups. Storing your backups at a different location is the best idea, but at least store them in a room apart from your computer.

Backup devices

The backup device you select depends on the value of your data, your current equipment, and your budget. Most computer owners use what they have — a writable CD drive, Zip drive, or floppy disk drive.

The major disadvantage of backing up your data on CDs and DVDs is that the writing process is slow — slower than writing data to tape or a removable hard disk. Further, although it is feasible to back up your entire system on a series of CDs or DVDs, you would have to use special backup software, monitor the backup process, and switch disks occasionally. CDs and DVDs are more practical for backing up a select group of important data files.

Zip disks with 100 MB or 250 MB capacity are sufficient for backups of documents and most digital graphics files. Several 750 MB Zip disks might be enough for backing up all your data files and could be feasible for a full-system backup if you have not installed lots of application software.

A second hard disk drive is a good backup option — especially if it has equivalent capacity to your main hard disk. This capacity allows the backup process to proceed unattended because you won’t have to swap disks or CDs. Speed-wise, a hard disk is faster than tape, CD, or DVD drives. Unfortunately, like your computer’s main hard disk, a backup hard disk is susceptible to head crashes, making it one of the least reliable storage options.

Network and internet backup

If your computer is connected to a local area network, you might be able to use the network server as a backup device. Before entrusting your data to a server, check with the network administrator to makesure you are allowed to store a large amount of data on the server. Because you might not want strangers to access your data, you should store it in a password-protected, non-shared folder. You also should makesure the server will be backed up on a regular basis so that your backup data won’t be wiped out by a server crash.

Several Web sites offer fee-based backup storage space. When needed, you can simply download backup files from the Web site to your hard disk. These sites are practical for backups of your data files, but space limitations and download times make them impractical for a full-system backup. Experts suggest that you should not rely on a Web site as your only method of backup. If a site goes out of business or is the target of a Denial of Service attack, your backup data might not be accessible.

Backup software

To make a backup, you can use backup software — a set of utility programs designed to back up and restore files. Backup software usually includes options that make it easy to schedule periodic backups, define a set of files that you want to regularly back up, and automate the restoration process.

Backup software differs from most copy routines because it typically compresses all the files for a backup and places them in one large file. Under the direction of backup software, this file can spread across multiple tapes if necessary. The file is indexed so that individual files can be located, uncompressed, and restored.

Boot disks

A boot disk is a floppy disk or CD containing the operating system files needed to boot your computer without accessing the hard disk. A barebones boot disk simply loads the operating system kernel. It is needed, if your hard disk fails or a virus wipes out the boot sector files on your hard disk, you will not be able to use your normal bootprocedure.

To create an MS-DOS boot disk, insert a blank floppy disk in drive A. Open My Computer or Windows Explorer, and then right-click the Drive A icon. Select Format and check the box labeled Create an MS-DOS startup disk.

Сomprehension check. Match the beginnings of the sentences in the first column with the endings in the second one.

1. A backup is a copy of one or more files a) to restore your computing environment to its pre-disaster state with a minimum of fuss.
2. A good backup plan allows you b) and automating the process requires a large capacity tape backup device or a second hard disk drive.
3. You must devise your own backup plan c) that is tailored to your particular computing needs.
4. A full-system backup takes a lot of time d) that has been made in case the original files become damaged.
5. Your backup schedule depends on how much data e) value of your data, your current equipment, and your budget.
6. The backup device you select depends on the f) you can afford to lose.
7. If your computer is connected to a local area network g) you might be able to use the network server as a backup device.

Vocabulary practice

1. Put the appropriate unscrambled words into the sentences on the right.

  covreer evitartalen lailtsner emagad mumide aiueflr 1. Because you backed up only data files you must manually ___ all your software before restoring your data files. 2. You need a backup plan that helps you ___ data that’s been wiped out by operator error, viruses or hardware ___. 3. Store your backups in a safe place or a fire or flood that ___ your computer could also wipe out your backup. 4. A workable ___ to a full system backup is a selective backup that contains only your most important data files. 5. A backup is usually stored on a different storage ___ from the original files.

2. Fill in the blanks choosing from the variants given.

1. A backup is usually … (detected/stored) on a different storage medium from the original files.

2. A workable alternative to a full system backup is a … (selective/overall) backup that contains only your most important data files.

3. Storing your backups at a different locations is … (not a good/the best) idea.

4. The backup device you select depends on … (how much data you can afford to lose/the value of your data/your current equipment and your budget).

5. A full-system backup … (can be done in no time/takes a lot of time).

6. Under normal use most people schedule … (an everyday backup/once-a-week backup).

3. Match the beginnings and the endings of the instructions/steps given and put them into correct order.

1. Your backup schedule depends on a) that is tailored to your particular computing needs.
2. No single backup plan fits b) most people schedule a once-a-week backup.
3. You can’t always prevent data disasters c) how much data you can afford to use.
4. You must devise your own backup plan d) everyone’s computing style or budget.
5. Under normal use e) but at least store them in a room apart from your computer.
6. The best idea is storing your backups at a different location f) so you need a backup plan that helps you recover data that’s been wiped out.

4. Fill in the gaps in the text.

A backup is a copy of one or more files that has been made in case the original files become damaged. For safety, a backup is usually stored on a different storage medium from the original files. A good backup plan allows you to _1_ your computing environment to its pre-disaster state with a minimum of fuss.

No single backup plan fits everyone’s computing style or budget. Your personal backup plan depends on the files you need to back up, the hardware you have available to make backups, and your backup software. In any case, it is a good idea to back up the Windows _2_ and make sure your files are free of _3_. Backups should be stored in a safe place, away from the computer.

Backups can be recorded on floppy disks, writable CDs and DVDs, networks, Web sites, a second hard disk, or tapes. Many computer owners depend on writable CDs for backups, and use My Computer or Windows _4_ to simply select files and copy files to the backup. _5_ drives and backup software are typically used in business situations when a full-system backup is desirable. Backup software differs from most copy routines because it _6_ all the files for a backup into one large file.

In addition to file backups, you should have a _7_ disk containing the operating system files and settings needed to start your computer without accessing the hard disk

Speaking. Discuss the following questions.

1. Why do you need to make backups?

2. What are the major strategies and plans of backup? What does their choice depend on?

3. What are the advantages and disadvantages of different backup devices?

4. What can you say about network and internet backup?

5. What can you say about backup software?

6. What is a boot disk? How can it be created?

Critical thinking. Read the article and express you opinion on the problem.

Computer Crime

It doesn’t take any special digital expertise to mastermind some computer crimes. Setting fire to a computer doesn’t require the same finesse as writing a stealthy virus, but both can have the same disastrous effect on data. “Old-fashioned” crimes, such as arson, that take a high-tech twist because they involve a computer can be prosecuted under traditional laws.

Traditional laws do not, however, cover the range of possibilities for computer crimes. Suppose a person unlawfully enters a computer facility and steals backup tapes. That person might be prosecuted for breaking and entering. But would common breaking and entering laws apply to a person who uses an off-site terminal to “enter” a computer system without authorization? And what if a person copies a data file without authorization? Has that file really been “stolen” if the original remains on the computer?

Many countries have computer crime laws that specifically define computer data and software as personal property. These laws also define as crimes the unauthorized access, use, modification, or disabling of a computer system or data. But laws don’t necessarily stop criminals. If they did, we wouldn’t have to deal with malicious code and intrusions.

A 1995 high-profile case involved a computer hacker named Kevin Mitnick, who was accused of breaking into dozens of corporate, university, government, and personal computers. Although vilified in the media, Mitnick had the support of many hackers and other people who believed that the prosecution grossly exaggerated the extent of his crimes. Nonetheless, Mitnick was sentenced to 46 months in prison and ordered to pay restitution in the amount of $4,125 during his three-year period of supervised release. The prosecution was horrified by such a paltry sum – an amount that was much less than its request for $1,5 million in restitution.

Forbes reporter Adam L. Penenberg took issue with the 46-month sentence imposed by Judge Marianne Pfaelzer and wrote, “This in a country where the average prison term for manslaughter is three years. Mitnick’s crimes were curiously innocuous. He broke into corporate computers, but no evidence indicates that he destroyeddata. Or sold anything he copied. Yes, he pilfered software — but in doing so left it behind. This world of bits is a strange one, in which you can take something and still leave it for its rightful owner. The theft laws designed for payroll sacks and motor vehicles just don’t apply to a hacker.”

The U.S. Patriot Act and the Cyber-Security Enhancement Act carry even stiffer penalties – anywhere from 10 years to life in prison.

A CNET reporter questions the harshness of such penalties: “What bothers me most is that here in the United States, rapists serve, on average, 10 years in prison. Yet if, instead of assaulting another human being, that same person had released a virus on the Net, the criminal would get the same or an even harsher sentence.”

Law makers hope that stiff penalties will deter cyber criminals. U. S. Attorney John McKay is quoted as saying, “Let there be no mistake about it, cyber-hacking is a crime. It harms persons, it harms individuals, it harms businesses.

These cases illustrate our culture's ambivalent attitude toward computer hackers. On the one hand, they are viewed as evil cyberterrorists who are set on destroying the glue that binds together the Information Age. From this perspective, hackers are criminals who must be hunted down, forced to make restitution for damages, and prevented from creating further havoc.

From another perspective, hackers are viewed more as Casper the Friendly Ghost in cur complex cybermachines – as moderately bothersome entities whose pranks are tolerated by the computer community, along with software bugs. Seen from this perspective, a hacker's pranks are part of the normal course of study that leads to the highest echelons of computer expertise.

What do you think?

1. Should a computer virus distribution sentence carry the same penalty as

manslaughter?

2. Should it be a crime to steal a copy of computer data while leaving the original data

in place and unaltered?

3. Should hackers be sent to jail if they cannot pay restitution to companies and

individuals who lost money as the result of a prank?

4. Do you think that a hacker would make a good consultant on computer security?

Final test. Do the tasks in the following test.

1. A (n) ___ is a copy of one or more files that has been made in case the original files become damaged.

2. The Windows ___ is an important group of files that the Windows operating system uses to store configuration information about all the devices and software installed on a computer system.

3. The main directory of a disk is referred to as the ___ directory.

4. The main hard disk drive on a PC is often referred to as “drive C”. (True/False)

5. A filename extension is usually related to a file ___, which is the arrangement of data in a file and the coding scheme used to represent the data.

6. Antivirus software is 100% reliable when it comes to protecting your computer from viruses. (True/False)

7. A file specification or path typically includes all of the following information EXCEPT ___.

a) the file author b) the file name c) the file extension d) the drive letter

8. ___ software is a set of utility programs that looks for and eradicates viruses, worms, and Trojan horses.

9. File-naming ___ are a set of rules for naming files.

10. The easiest way to convert a file from one format to another is to find an application program that works with both file formats. (True/False)

11. Deleting a file’s icon from a directory does not necessarily remove the data from the disk. (True/False)

12. A computer ___ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

13. A root directory typically contains smaller ___, often depicted as folders in graphical user interfaces.

14. A (n) ___ is a computer program that seems to perform one function while actually doing something else.

15. A virus can be spread if people distribute infected files by ___.

a) exchanging disks or CDs b) sending e-mail attachments

c) downloading software from the Web d) all of the above

16. You should update your antivirus software regularly. (True/False)

17. Bot-infected computers linked together into a network is called a(n) ___.

18. A virus ___ is a section of the virus program that can be used to identify a known virus.

19. Computer virus trigger events are often tied to a specific date. (True/False)

20. The file ___ helps you keep track of the most current version of your file when you have saved several versions.

Projects. Choose and perform one of the projects given.

1. Select one of the following statements and argue for or against it:

- People have the “right” to hone their computing skills by breaking into computers.

- A person who creates a virus is perfectly justified in releasing it if the purpose is to make everyone aware of these security breaches.

- Computer crimes are no different from other crimes, and computer criminals should be held responsible for the damage they cause.

2. Suppose you are a reporter for a local television station. Your assignment is to create a 90-second story about new emerged virus for your local TV news show. The basic objectives of the story are (1) to inform about the ways of spreading this virus and attributes that enable a person to find out presence of this particular virus and (2) to provide a set of concrete steps that a person could take to minimize the consequences for his computer and get rid of the virus. Of course, the network wants the story to be interesting, so you have to include a human-interest angle. Write the script for the story and include notes about the visuals that will appear.

Наши рекомендации