Computer Viruses Essays and Research Papers

Instructions for Computer Viruses College Essay Examples

Title: computer viruses

  • Total Pages: 10
  • Words: 2542
  • References:0
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: A source could be the format used in a textbook titled Research Design second edition by John W Creswell page 52

I am interested on a QUANTITATIVE research paper that discusses computer viruses and written in the following format:

Introduction
Statement of the problem
Purpose of the study
Theoretical perspective
Research questions or hypothesis
Definition of terms
Delimitations and limitations
Review of literature
Methods
Type of research design
Sample population and participants
Data collection instruments, variables and materials
Data analysis procedures
Anticipated ethical issues in the study
Preliminary studies or pilot tests
Significance of the study
Appendixes: instruments ,timeline and proposed budget

Thanks!!

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
References:

References

Hickman, J.R. (1995). "Viruses: New strains, new solutions." ABA Banking Journal,

Hopkins, W. (000). "Quantitative Research." Sports Science. 30, October 2005: http://www.sportsci.org/jour/0001/wghdesign.html

Horn, R.V. (2003). "Technology: Prudent computing." Phi Delta Kapan, 85(3): 183.

Hunton, J.E. (1998). "Facts and fables about computer viruses." Journal of Accountancy,

Rajala, J.B. (2004). "Computer virus protection." Technological Horizons in Education,

Williams, J. (2001). "IT Pragmatics, 2001). The Public Manager, 30(3): 58.

Order Custom Essay On This Topic

Title: Computer viruses

  • Total Pages: 9
  • Words: 2494
  • Works Cited:0
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: Write a researched report that contain the following elements: title page, letter of transmittal in proper format for business letters, table of contents, table of tables and figures, informative abstract for the busy executive who cannot read the entire paper, introduction (purpose, sources, authorization), conclusions, recommendations, and finally the body of the paper with clearly numbered headings for each paragraph. The research report should be about 2500 to 3500 words, and contain a Works Cited section in MLA format that has parenthetic citations to refer to the Works Cited page.

A new company in town wants to begin a local-area network to make communication easier among the various parts of the company. However, they are very concerned about protecting their investment by keeping virus attacks out of their computer system. They themselves have no idea what viruses might be out there; they are merely paranoid about all the stories they?ve heard. However, they do think they ought to become more knowledgeable about viruses. So, they hire you, a well known experts about viruses, to research types of viruses and the damage they can do. When you have completed your research, you submit to the company a well researched and well presented business report that draws some clear conclusions and offers some solid recommendations about the way they need to handle the virus threat. The research report needs to conform to the following outline:

Title Page
Letter of Transmittal
Table of Contents
Table of Tables and Figure
Informative Abstract
1. Introduction
1.1. Purpose
1.2. Sources
1.3. Authorization
2. Conclusion
3. Recommendation
4. Threats to Local Area Networks (LAN)
4.1. Computer Viruses
4.1.1. Boot-sector
4.1.2. File-infecting
4.1.3. Email
4.1.4. Macro
4.1.5. Multi-partite
4.1.6. Script
4.1.7. Signatures
4.1.7.1. Encrypted Code
4.1.7.2. Mutating Code
4.1.7.3. Polymorphic Code
4.2. Worms
4.3. Trojan Horses
4.4. Hackers and Crackers
4.4.1. Hackers
4.4.2. Crackers
4.5. Securing Networks Systematically
4.5.1. Customizing Software
4.5.2. Harden and Secure the Network
4.5.3. Prepare
4.5.4. Detect
4.5.5. Respond
4.5.6. Improve the System
4.5.7. Repeat the Cycle of Steps
5. Works Cited

The report should contain zero passive sentences.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Works Cited:

Bibliography

Brouwer, Mark W. Virus or Hoax?

1997. Virusall.com. June 01, 2004. http://virusall.com/virus.html

Landesman, Mary. Boot Sector Viruses.

2004. Antivirus.com. June 01, 2004. http://antivirus.about.com/cs/tutorials/a/bsvirus.htm

Mehta, Saumil. Virus Basics.

2001. Internet Explorer Supersite. June 01, 2004. http://balasainet.com/iesupersite/support/virus.htm

Schmugar, Craig. I Love You Virus Information.

2000. Get Virus Help. June 01, 2004. http://getvirushelp.com/iloveyou/

Brouwer, Mark. Virus or Hoax?

Virusall.com. June 01, 2004. http://virusall.com/worms.html

Adams, Mark. Hackers or Crackers.

The Magazine of Hal-PC User Group. June 01, 2004. http://www.hal-pc.org/journal/dec99/Column/hackers/hackers.html

Securing Networks Systematically - the SKIP Method.

Cert Coordinator Center. June 01, 2004. http://www.cert.org/archive/pdf/SKIP.pdf

Order Custom Essay On This Topic

Title: Writing Business Messages

  • Total Pages: 1
  • Words: 318
  • Bibliography:0
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: Size: 1 page, about 250 words

Audience:
Your workgroup on the job as a CS professional, plus your boss.

The Task (What to do):
Your job is to write a hypothetical email note expressing your concerns about the increase of computer viruses in your workplace and potential damage within the company. The message should be serious, and may focus on either your analysis of the problem, suggested solutions or precautions, or both. The email should be directed to one or more workplace colleague(s), but should also be cc'd to your boss.

Normally email is one of the least formal forms of professional writing that you will do. Quick messages to friends or coworkers can even be ungrammatical, with spelling errors and typos, and the message gets through. Rarely does informality in an email message result in a poor impression on the part of the recipient. However, at times your email writing needs to move up a notch in quality and formality. This usually happens when the topic is more serious and when one or more of the recipients is not well known to the sender.

Pretend you are working in a job as a professional and are concerned about the assigned topic/issue. The issue should be treated as thought it were of about medium importance, such that an email message is an appropriate way to raise it for discussion. Write a message of about 250 words (one page) addressed to one or more coworkers (at least one of whom is not well known to you) with a copy to your boss. Bring the issue to their attention and perhaps suggest an appropriate action. The copy will let your boss know you are concerned about this issue, and will let the other recipient(s) know your boss is in the loop.

Be explicit and clear enough about everything in the message content, so outsiders can understand the issue and why you are sending the message to this person or persons. Hint: One way you can do this is to mention the role of that person in the message. Example: "I am sending this to you because of your role as security officer for our department."

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Order Custom Essay On This Topic

Title: MIS

  • Total Pages: 2
  • Words: 564
  • Sources:0
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: Memo format

You are a consulting team formed to advise Dirt Bikes USA on how to address the IS-related responsibilities of the organization. A number of the areas and initial questions should be relatively obvious based on the readings, for example;



•Business continuity planning and disaster recovery

some ideas to touch on

Continuity Planning

· Focuses on restoring business operations after a disaster

· Identifies critical systems and business processes

· Determines action plans for handling mission-critical functions when systems go down

· Must be continually revisited for updates and refinement

· Plans address loss of facilities, personnel, or critical systems

· Coordinated with disaster recovery plans

· Business managers and IT specialists work together

· Business impact analysis

Disaster Recovery

· Provide hot sites housing spare computers at locations around the country for unning critical applications in an emergency

o Comdisco disk recovery services

o Sun guard availability services

· Plans for events:

o Power outages floods earthquakes terrorist attacks

· Dirt Bikes is concerned with:

o Power outages

o Vandalism

o Computer viruses

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Order Custom Essay On This Topic
Request A Custom Essay On This Topic Request A Custom Essay
Testimonials:
“I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.’’ Tiffany R
“I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!’’ Charlotte H
“I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college.’’ Bill K