Ex. 9 Describe the influence of viruses on the work of the computer.

Ex. 10Give the classification of computer viruses.

Ex. 11 Discuss the text according to the points:

1. The term computer virus

2. Malware, adware and spyware programs

3. The spreading of viruses

4. The harmful actions of viruses.

 

IV Reading and comprehension

Ex. 12. Read the text and translate it

Nonresident and resident viruses

New word

nonresident viruses – не постійні віруси

resident viruses – віруси компаньйони

replication - копіювати

finder module – файлові віруси

eplication module – загрузочні віруси

 

1. Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.

2. Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. However, this module is not called by a finder module. Instead, the virus loads the replication module into memory when it is executed and ensures that this module is executed each time the operating system is called to perform a certain operation. For example, the replication module can be called each time the operating system executes a file. In this case, the virus infects every suitable program that is executed on the computer.

3. Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. For instance, a fast infector can infect every potential host file that is accessed. This poses a special problem to anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory, the virus can scanner it and in this way infect all files that are scanned.

4. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software.

5. Slow infectors, on the other hand, are designed to infect hosts infrequently. For instance, some slow infectors only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably, and will at most infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach does not seem very successful.

 

Ex. 13 Find in the text where it is said about the points given below. Put down the number of the paragraph

1. The categories of resident viruses

2. Viruses which consist of a finder modules and a replication module

3. Some slow infectors are designed to infect hosts infrequently

4. The virus infects every suitable program

5. Fast infector can infect every potential host file

Ex. 1 4 Find the synonyms to the following words in the text:

1. answerable (1)

2. to hire (2)

3. perform(2)

4. guarantee (2)

5. to inspire (2)

6. approach (3)

7. instruction(5)

8. execute (4)

Ex. 15. Give Ukrainian equivalents to the following words and word –combinations. Find these words in the text, read and translate them:

1. to load

2. to subdivide

3. virus scanner

4. to rely

5. to infect

6. detection

7. suspicious actions

8. successful

Ex. 16 Find the terms in the text which describe the following. Put down the number of the paragraph

a. a collection of information on one subject that is stored in a computer or disk

b. to prevent sth happening or to try not to do sth.

c. instructions that are put into a computer program in order to stop it working

d. a thing that is difficult to deal with or to understand

e. to perform a task, or to put a plan into action

f. the qualities or abilities that that something or somebody has but that may not be fully developed

 

Ex. 17 Say if the following statements are true or false:

1. For each new executable file the finder module encounters, it calls the replication module to infect that file.

2. Replication module is called by a finder module.

3. The replication module cannot be called each time the operating system executes a file.

4. A fast infector can infect every potential host file that is accessed.

5. Slow infectors rely on their fast infection rate to spread.

6. The slow infector approach does not seem very successful.

Ex.18 Answer the following questions. Find answers in the text. Put down the number of the paragraph

1. What do nonresident viruses consist of?

2. When does virus load the replication module into memory?

3. What can a fast infector infect?

4. When can the virus piggy-back on the virus scanner?

5. What is designed to avoid detection by limiting viruses’ actions?

V. Oral Practice