...Virus H1N1 (Influenza) La gripe H1N1 es una enfermedad respiratoria contagiosa que causa síntomas similares a los de la influenza en las personas. Los virus de influenza cambian constantemente sus genes (mutacion). Este virus aparece en los cerdos tanto como en los humanos. El tratamiento para este virus es vacunarse y descansar en el hogar. Su supervivencia en el ambiente es de 1 a 2 dias. Herpes VHS02 La infección por el VHS-2 está muy extendida y se transmite sobre todo por vía sexual. Dura toda vida y no tiene cura. Se calcula que cada año se infectan con este virus unos 20 millones de personas. La infección por el VHS-2 está presente en todo el mundo y constituye un importante problema mundial. El VHS-2 causa herpes genital, que se caracteriza por la aparición ocasional de úlceras genitales dolorosas que pueden tener un importante efecto negativo en el bienestar y las relaciones personales. No existe tratamiento ya que no tiene cura y vive entre nosotros toda la vida. Su supervivencia es de 5 horas a 8 semanas en el ambiente Los virus estan vivos? Los virus son microorganismos acelulares, es decir, no tienen ni son células. Las células son las unidades de vida más pequeñas ya que cumplen las tres funciones vitales: nutrición, relación y reproducción. Los virus ni se nutren , ni se relacionan, y sólo se reproducen en el interior de otras células. Son parásitos obligados. Si los virus no están en el interior de las células ni siquiera se reproducirían...
Words: 269 - Pages: 2
...Chikunganya virus. About thousands of people have been affected by Chikungunya virus throughout the world. During the years of 2005 and 2006, the virus altered over a millions of people in the Africa, Asia and the Indian subcontinent. Now, Chikungunya virus have spread to Europe, South American and North America. Chikungunya is a viral disease that is spread by mosquitoes. There are two type of mosquitos that spread this disease that we will talk further into in this paper. There is no signs or researches that the virus can be passed on or spread by contact from human to human. The nearness of mosquito breeding sites to human habitations is a major risk factor for Chikungunya. This disease shares a similar type of clinical signs with the dengue virus, therefore in locations where dengue is common, the virus can be misdiagnosed with the dengue virus. Once a person is affected by the virus it can lead to many symptoms but the most common symptoms can include muscle pain, headache, nausea, fatigue and rash. As of today, there is no vaccine to cure Chikungunya virus. Treatment of chikungunya is concentrated in relieving the virus. In this paper, we are going to learn everything about chikungunya virus starting with where it came from, how it expanded, the structure of its genome, and all the way until how to treat the virus. Chikungunya virus is known to be abbreviated as CHIKV The topics that we are going to discuss will be, the structure of the virus, the history of the virus, the vectors...
Words: 876 - Pages: 4
...The Ebola Virus 10 out of 10 people infected with it will die with die with it. It is airborne. It is 100 times more contagious than AIDS. It has no known origin, vaccination or cure. It kills you in such a way that even highly trained professionals get sick from just hearing about the effects. It is real and it has started its attack on the human race. Mrs. Landau and fellow classmates. The symptoms I have just described to you are real. These are symptoms to a real and fatal virus. The virus's name is Ebola and it has started its burn into our society. Like the AIDS virus, nothing really is known about it except its effect on people. Like the AIDS virus, there is no cure, treatment or vaccination. Unlike the AIDS virus which can take up to 8 to 10 years to kill you, this virus can take as little as to 8 to 10 hours to result fatally. It starts off with a fever and symptoms of the flu. Then the muscles in your face stop moving freezing your face into a mask. Just before death, you start to bleed from every opening in your body starting from your nose and mouth to your gums. Your internal organs liquefy and you vomit them up. In reality, the virus has attempted to turn its host into a virus. You are dead before you have even started to show signs of this virus. It is believed that it is some sort of mutated form of AIDS because it started in the original spot as AIDS did, Kinshasa and moved along the highway ripping its way through Northern Africa....
Words: 464 - Pages: 2
...Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory) triggers the anti-virus program. The opposite term -...
Words: 4870 - Pages: 20
...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised...
Words: 271 - Pages: 2
...The entry within a cell requires receptor binding to occur on the cell membrane with HA, and this is considered fusion. Once the HA is able to bind and enter within the cell the replication process will occur. The entering virus travels from the cytoplasm of the epithelial cell towards the nucleus of the cell. The main purpose here is for the virus to release the RNA gene segments by unraveling for further replication with polymerase chemicals acting as the catalyst for duplication. Once hundreds upon thousands of gene segments are replicated using the epithelial cells own energy the duplicated RNA gene segments make their way from the nucleus back out to the cytoplasm. The development for new HA proteins and other proteins for the virus takes place, and the role NA has in this regard is to destroy the receptors cleaving sialic acid allowing for viruses to push through the cell membrane to further infect other cells. What are the symptoms for how the human body responds when this pathogen infects the respiratory...
Words: 1739 - Pages: 7
...Genital herpes is a sexually transmitted disease. That means that genital herpes can be only contracted through oral, anal, or vaginal sex. Genital herpes is spread through the herpes simplex virus. There are two different types of this virus; herpes simplex virus type one and herpes simplex virus type two (Engelkirk, 2011). Herpes simplex one usually affects the mouth in the way of cold sores or blisters. It is herpes simplex two that causes genital herpes. It will be Herpes simplex two that I will be focusing on for the duration of this paper. In the following paragraphs I will be going into further detail about mode of transmission, signs and symptoms, treatment, prevention, complications, and implications to the health of the community...
Words: 678 - Pages: 3
...Computer Virus Good afternoon, ladies and gentlemen, I’m glad to bring my presentation for everyone. Before the start, I want to ask a question, I think most people like searching internet, someone like play computer games, someone like shopping, someone do other things. Whether you have the experience of account theft, information loss, and other internet security problems. So, today my topic relate these problems, computer virus. What is computer virus? CV is a computer program that can replicate itself and spread from one computer to another, and it cause the damage of computer function or destruction of data. Does anybody who knows the first computer virus in the world? Generally believed that as early as 1981, Apple gave birth to the first computer virus. In 1986 a personal computer virus, comes from a pair of Pakistan's brothers, Buster and Amjad for the purpose of preventing piracy written in C-the BRAIN virus. It is estimated that there are about 2 million mature hackers in the world, and over ten thousand new virus every day, the virus caused the loss of $ 100 billion annually. (1) Computer virus is a new derived in the form of computer crime A computer virus is a high-tech crime, transient, dynamic and random. Difficult to evidence, the risk of small damage, so stimulating crime awareness and crime activities. The virus does not come from the unexpected reason, most virus can be found in the author and origin information, from the statistical analysis of a large...
Words: 598 - Pages: 3
...Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do...
Words: 573 - Pages: 3
...Mumps is the popular name for Parotitis. Mumps is a viral infection transmitted by and affecting only humans. It is spread through saliva or mucus from the mouth, nose, or throat. A person can only get the mumps from another person that coughs, sneezes, or just by simply talking to someone that already has the virus. Other factors include sharing personal items and touching unsanitary objects or surfaces. As one can infer, this virus can easily be spread amongst children daycare centers, schools, and college dorms. Mumps cases are most prevalent in late winter or early spring. Signs and symptoms of Mumps include fever, headache, muscle aches, tiredness, loss of appetite, and swollen or tender salivary glands under the ears on one or both sides....
Words: 576 - Pages: 3
...nucleic acid and protein, are very dangerous and in some cases can even be lethal. This essay will be focusing on two different viruses (Zika Virus and Lassa Virus), and will prove that an outbreak of Zika Virus would be more dangerous to public health in Queensland than an outbreak of Lassa Virus. This will be discussed through four different criteria: the mode of transmission, the treatment, symptoms and the mortality rate. TRANSMISSION: One way to reveal whether an outbreak of a specific virus would be dangerous to public health, would be to understand how that virus is transmitted from one person to another. Zika virus is mainly transmitted by the Aedes mosquitos....
Words: 1482 - Pages: 6
...The influenza virus, as stated by the Victorian Government Department of Human Services (2004), is a severe communicable respiratory disease that has three alternate types as well as a variety of strains, where common symptoms across the board include fever, headache, muscle pain, lethargy, nasal congestion, sore throat and cough. Other symptoms, particularly in children, may also include gastrointestinal symptoms such as nausea, vomiting and diarrhoea. These symptoms when severe can lead to potential death. Contributing to its communicability are the reservoirs of the virus. Primarily, influenza is known to be harboured in humans, making them the primary reservoir. However, recent research has evoked suspicion of animals also having the ability to act as a reservoir for new arising influenza strains. This of which is assumed to occur when humans and animals live in close proximity to each other resulting in increased interspecies contact. Furthermore, the influenza virus is in general transmitted from person to person through direct contact with respiratory aerosols and secretions from an...
Words: 566 - Pages: 3
...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves. Viruses only spread across multiple computers if an uninfected computer is connected...
Words: 2136 - Pages: 9
...Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these symptoms and a gestation time of 3 to 14 days and lasts anywhere from 3 to 6 days. The next way that WNV manifests is through severe infection...
Words: 1005 - Pages: 5
...“Melissa virus infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000. The virus code is contained in one macro named "Melissa"” (Melissa Virus). This virus comes with a harmful capability especially in Word 97. It has the power to spread its virus rapidly by using an email. When it is opened for the first time the virus checks if the user’s computer have the program MS Outlook installed. Then if it finds the program, the virus will then sends email to the email addresses found in the address book. “The email that is sent by the virus will contain the following subject header: ‘Subject: Important Message From ,’ where is the full name of the user sending the message. While the content of the body contains ‘Here is that document you asked for ... don't show anyone else ;-)’ with an attachment ‘list.doc’ which contains references to a lot of pornographic sites” (CERT® Advisory). Because of the email system the virus spreads quickly. “It created this entry in the Windows registry: HKEY_CURRENT_USERSoftwareMicrosoftOffice"Melissa?"="...by Kwyjibo" and in some cases when the day of the month equals the minute value, a payload of text is written at the current cursor position that says: "Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." The mentioned quote is taken from Bart Simpsons’ character in The Simpsons which disables some security safeguards of the computer” (Melissa virus). Melissa Virus...
Words: 554 - Pages: 3