CS001 Assignment No. 02 Solution Spring 2013
Page 1 of 1 • Share
CS001 Assignment No. 02 Solution Spring 2013
Assignment No. 02
Semester: Spring 2013
Computer Proficiency Licence-CS001
Total Marks: 10
Due Date: 16/05/2013
Instructions:
Please read the following instructions carefully before submitting assignment:
It should be clear that your assignment will not get any credit if:
The assignment is submitted after due date.
The assignment is submitted by email.
The submitted assignment does not open or file is corrupt.
All types of plagiarism are strictly prohibited.
It is in some format other than .doc (MS Word Document).
Objectives:
To learn and understand about Computer environment and Viruses.
For any query about the assignment, contact at cs001@vu dot edu dot pk
Assignment Questions
Question No 1: Marks 5
(a) The environment given in the snapshot will be quite familiar to you. Following image contains some components labeled with numbers. All these components are part of windows environment. Your task is to identify and name them.
[You must be registered and logged in to see this image.]
(b) Assume that you are working on your computer and your Mouse suddenly stopped working. How would you perform these tasks by using keyboard only? You are required to mention the keyboard short cuts of the following tasks.
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
Question No 2: Marks 5
Internet is a great source of information. Your task is to find and learn the information available on internet about virus and its types. You are required to write in your own words about virus and its 4 different types.
BEST OF LUCK
Semester: Spring 2013
Computer Proficiency Licence-CS001
Total Marks: 10
Due Date: 16/05/2013
Instructions:
Please read the following instructions carefully before submitting assignment:
It should be clear that your assignment will not get any credit if:
The assignment is submitted after due date.
The assignment is submitted by email.
The submitted assignment does not open or file is corrupt.
All types of plagiarism are strictly prohibited.
It is in some format other than .doc (MS Word Document).
Objectives:
To learn and understand about Computer environment and Viruses.
For any query about the assignment, contact at cs001@vu dot edu dot pk
Assignment Questions
Question No 1: Marks 5
(a) The environment given in the snapshot will be quite familiar to you. Following image contains some components labeled with numbers. All these components are part of windows environment. Your task is to identify and name them.
[You must be registered and logged in to see this image.]
(b) Assume that you are working on your computer and your Mouse suddenly stopped working. How would you perform these tasks by using keyboard only? You are required to mention the keyboard short cuts of the following tasks.
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
Question No 2: Marks 5
Internet is a great source of information. Your task is to find and learn the information available on internet about virus and its types. You are required to write in your own words about virus and its 4 different types.
BEST OF LUCK
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Re: CS001 Assignment No. 02 Solution Spring 2013
check it
1. Desktop
2. Start menu
3. Quick Launch
4. Taskbar
5.system tray
1. Alt+f4
2. Ctrl X
3. Alt+tab
4. F2
1. Desktop
2. Start menu
3. Quick Launch
4. Taskbar
5.system tray
1. Alt+f4
2. Ctrl X
3. Alt+tab
4. F2
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Re: CS001 Assignment No. 02 Solution Spring 2013
Question No.01 Solution of Part A
1. Desktop
The large area that is the upper part of the screen is called the Desktop. Sometimes (to keep you confused!) people may use the term Desktop to refer to everything you see on the monitor after Windows has gotten started.
2. Start menu
We saw in the last lesson that the desktop can be used to launch your software. Another way to launch your programmes is through the Start menu at the bottom of the Desktop. Your Start button should look something like the one below.
3. Quick Launch
The Quick Launch toolbar, next to the Start Menu button, holds shortcuts to your frequently used programs. This is handy because the Taskbar is normally in view all the time. Desktop shortcuts can get hidden by open applications.
4. Taskbar
Across the bottom of the screen we see the Taskbar. Normally it is in view all the time. The Taskbar's main job is to show what applications are currently running.
5. Notification Area
The notification area, or tray, at the far right of the Taskbar is used to show icons for programs that are awake and hanging around in the background, like the clock, anti-virus, and scheduling programs.
1. Desktop
The large area that is the upper part of the screen is called the Desktop. Sometimes (to keep you confused!) people may use the term Desktop to refer to everything you see on the monitor after Windows has gotten started.
2. Start menu
We saw in the last lesson that the desktop can be used to launch your software. Another way to launch your programmes is through the Start menu at the bottom of the Desktop. Your Start button should look something like the one below.
3. Quick Launch
The Quick Launch toolbar, next to the Start Menu button, holds shortcuts to your frequently used programs. This is handy because the Taskbar is normally in view all the time. Desktop shortcuts can get hidden by open applications.
4. Taskbar
Across the bottom of the screen we see the Taskbar. Normally it is in view all the time. The Taskbar's main job is to show what applications are currently running.
5. Notification Area
The notification area, or tray, at the far right of the Taskbar is used to show icons for programs that are awake and hanging around in the background, like the clock, anti-virus, and scheduling programs.
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Re: CS001 Assignment No. 02 Solution Spring 2013
(b) Assume that you are working on your computer and your Mouse suddenly stopped working.
How would you perform these tasks by using keyboard only?
You are required to mention the keyboard short cuts of the following tasks.
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
How would you perform these tasks by using keyboard only?
You are required to mention the keyboard short cuts of the following tasks.
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Re: CS001 Assignment No. 02 Solution Spring 2013
Question No.01 Solution of Part B
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
Ans: 1. Alt+f4
2. Ctrl X
3. start then Alt+f4
4. F2
5. start , press R Enter and type cmd
1. To close a window.
2. To cut a selected file/folder
3. Window switching among open applications
4. To rename a selected file
5. To open command prompt (DOS).
Ans: 1. Alt+f4
2. Ctrl X
3. start then Alt+f4
4. F2
5. start , press R Enter and type cmd
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Re: CS001 Assignment No. 02 Solution Spring 2013
Question No.02 Solution
Boot Sector Virus
The boot sector virus was the first type of virus created. It hides itself in the executable code at the beginning of bootable disks. This means that in order to infect a machine you needed to boot from an infected floppy disk. Booting from floppy disk was a relatively regular occurrence, meaning that such viruses were actually quite well spread by the time that people find out what was happening.
Executable file virus (exe and com files)
The Executable File virus attaches itself to files, such as .exe or .com files. Some viruses would specifically look for programs which are associated with the operating system, so that they can run each time the computer was started, at this time they increase their chances of successful propagation or replication.
There were a few ways of adding a virus to an executable file, some of which worked better than others. The simplest way (and the least subtle) was to overwrite the first part of the executable file with the virus code. This meant that the virus executed when the program is started, but that the program would subsequently crash, leaving it quite obvious that there was an infection – especially if the file was an important system file.
The Terminate and Stay Resident (TSR) Virus
TSR is a DOS-term where an application would load itself into memory, and remain in the background, allowing the computer to run as normal in the foreground. The more complex of these viruses would intercept system calls that would expose them and return false results – others would attach themselves to the ‘dir’ command, and then infect every application in the directory that was listed. Some TSR’s even stopped or deleted the Anti-Virus software installed onto the systems.
The Polymorphic Virus
1st generation viruses were easy enough to detect. They had a certain signature to identify them, either within themselves as a method to prevent re-infection, or simply that they had a specific process structure which helps to detect them. Then along came the polymorphic virus. Poly – meaning multiple and morphic – meaning shape. These viruses change themselves each time they replicate, rearranging and editing their code, changing encryption and these viruses generally make themselves look totally different. This generated a huge problem, as instantly there were much smaller signatures that remained the same – some of the “better” viruses were reduced to a detection signature of a few bytes. The problem was increased with the release of a number of polymorphic kits into the virus writing community which allowed any virus to be recreated as a polymorph.
The Macro Virus
The Macro Virus makes use of the built-in ability of a number of programs to execute code. Programs like Word and Excel have limited, but very powerful versions of the Visual Basic programming language. This allows for the automation of repetitive tasks, and the automatic configuration of specific settings.
These macro languages are misused to attach viral code to documents which will automatically copy it to other documents, and spread. Although Microsoft has turned off the feature by default now on new installations, it seems that Outlook would automatically execute certain code attached to e-mails as soon as they were read. This meant that viruses were propagating very quickly by sending themselves to all of the e-mail addresses that were stored on the infected machine.
Boot Sector Virus
The boot sector virus was the first type of virus created. It hides itself in the executable code at the beginning of bootable disks. This means that in order to infect a machine you needed to boot from an infected floppy disk. Booting from floppy disk was a relatively regular occurrence, meaning that such viruses were actually quite well spread by the time that people find out what was happening.
Executable file virus (exe and com files)
The Executable File virus attaches itself to files, such as .exe or .com files. Some viruses would specifically look for programs which are associated with the operating system, so that they can run each time the computer was started, at this time they increase their chances of successful propagation or replication.
There were a few ways of adding a virus to an executable file, some of which worked better than others. The simplest way (and the least subtle) was to overwrite the first part of the executable file with the virus code. This meant that the virus executed when the program is started, but that the program would subsequently crash, leaving it quite obvious that there was an infection – especially if the file was an important system file.
The Terminate and Stay Resident (TSR) Virus
TSR is a DOS-term where an application would load itself into memory, and remain in the background, allowing the computer to run as normal in the foreground. The more complex of these viruses would intercept system calls that would expose them and return false results – others would attach themselves to the ‘dir’ command, and then infect every application in the directory that was listed. Some TSR’s even stopped or deleted the Anti-Virus software installed onto the systems.
The Polymorphic Virus
1st generation viruses were easy enough to detect. They had a certain signature to identify them, either within themselves as a method to prevent re-infection, or simply that they had a specific process structure which helps to detect them. Then along came the polymorphic virus. Poly – meaning multiple and morphic – meaning shape. These viruses change themselves each time they replicate, rearranging and editing their code, changing encryption and these viruses generally make themselves look totally different. This generated a huge problem, as instantly there were much smaller signatures that remained the same – some of the “better” viruses were reduced to a detection signature of a few bytes. The problem was increased with the release of a number of polymorphic kits into the virus writing community which allowed any virus to be recreated as a polymorph.
The Macro Virus
The Macro Virus makes use of the built-in ability of a number of programs to execute code. Programs like Word and Excel have limited, but very powerful versions of the Visual Basic programming language. This allows for the automation of repetitive tasks, and the automatic configuration of specific settings.
These macro languages are misused to attach viral code to documents which will automatically copy it to other documents, and spread. Although Microsoft has turned off the feature by default now on new installations, it seems that Outlook would automatically execute certain code attached to e-mails as soon as they were read. This meant that viruses were propagating very quickly by sending themselves to all of the e-mail addresses that were stored on the infected machine.
Victoria333- Monstars
-
Posts : 267
Join date : 2013-05-12
Age : 35
Location : Victoria
Similar topics
» CS401 Assignment # 3 Best Solution - Spring 2013
» MCM101 Assignment No.1 Best Solution - Spring 2013
» ACC311 Assignment No. 1 Solution Spring 2013
» CS506 Assignment No.3 Solution Spring 2013
» CS301 Assignment # 3 Solution Spring 2013
» MCM101 Assignment No.1 Best Solution - Spring 2013
» ACC311 Assignment No. 1 Solution Spring 2013
» CS506 Assignment No.3 Solution Spring 2013
» CS301 Assignment # 3 Solution Spring 2013
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
Yesterday at 12:21 pm by ali001
» Hemangiom'App
Tue Nov 05, 2024 11:25 am by ali001
» MindfulMe - Mental Health App
Mon Nov 04, 2024 10:50 am by ali001
» Learn Candlestick Patterns
Tue Oct 15, 2024 5:51 am by ali001
» Woh Pagal Si Episode 52 to 62 - Top Pakistani Drama
Sat Sep 21, 2024 6:26 pm by Mir Emmad Ali Khan Domki
» Nearu - share your socials
Sat Sep 21, 2024 1:12 pm by ali001
» Nightclub Tycoon: Idle Empire
Thu Sep 19, 2024 9:16 pm by ali001
» Carnivore - Meat Diet Recipes
Wed Sep 18, 2024 2:37 pm by ali001
» Eid Milad un Nabi Mubarak 2024 (Rabiʻ I 14, 1446 AH)
Tue Sep 17, 2024 3:44 pm by Mir Emmad Ali Khan Domki