Viruses Essay

827 words - 4 pages

Classification of viruses

Student name




Date due

Classification of Viruses

Most things living things in our world are classified into five different categories. Scientist, biologist and academics do this so they know the exact organism that is being examined and discussed. The five kingdoms of life are identified as: plant, fungi, animal, moneran and fungus. Although, in my research I discovered that some scientist argue that there should be more categories. Plants are many celled organisms and there are about a quarter million plant species. The animal kingdom has about ...view middle of the document...

This benefits the virus so it can enter a host cell and reproduce. Some viruses have outer membranes that enable the virus to infect the cell easily. Like our own cells, viruses carry genetic information that is encoded in their nucleic acid. They mutate and reproduce but they can’t carry out metabolism. This is why they are actually classified as a non- living creature. One of the weaknesses in the virus life cycle is that they cannot survive outside of a host cell. In another cell is where they have to reproduce. Viruses infect all kinds and types of cells in plants and animals. Although, most viruses tend to be host specific (Chalong 2013).
Viruses do not belong to any of the five kingdoms of life because of their structure. They do not exhibit the necessary characteristics to belong to any of the five kingdoms. Instead, they have to rely on the five kingdoms of life to survival. Viruses are very small compared to other living organisms. According to Dr. Hunt, Viruses range in size from 20 nanometers in diameter, such as the Parvoviridae, to several hundred nanometers in length in the case of the filoviridae (Hunt 2014).Compared to living cells, viruses do not have cells and have no cell membrane, nucleus or cytoplasm. They also cannot carry out metabolism like other organisms. They cannot respire or digest. These are primary characteristics of all living organisms. Many viruses are crystalline solutions unlike cells such as the polio and mosaic viruses. They have to rely on a host to reproduce unlike other organisms that can reproduce on their own. Outside the host...

Other assignments on Viruses

Internet Essay

444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Eboli Essay

880 words - 4 pages universal precaution and it’s important to educate yourself on the diseases that are being spread today. Ebola is one of the most talked about viruses that is going around today. It is so very important that everyone uses caution when coming in contact with people and it’s also important to educate yourself on the virus its self. This essay is to persuade everyone that Ebola is a deadly virus and to persuade everyone to educate themselves and lately

What I S Facebook

252 words - 2 pages just to update their status. If they don’t have facebook, their other friends will say you are old-fashion people. IN MY OPINION : I disagree, because it destroys your real social life and if you are not careful, you can pick up all kinds of viruses and also it is not nearly as private as they like to believe. DISADVATAGE OF USING FACEBOOK 1) Facebook can be easy addicting. It is addicting which often kills to your valuable time. 2

The Internet

804 words - 4 pages . When downloading on the net, viruses might be downloaded with as well. Though viruses can be received through other means like the use of floppy, a major source is the internet. Today computers are getting viruses that can destroy the computer’s entire hard drive. A lot of people are not properly educated about such viruses and what actions they can take in order to be proactive against them. All of the issues that I have discussed can be

Nt2580 Project 2

858 words - 4 pages files and add a password to it. 3) Malicious Code and Activity – countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created damaging code. Software - ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. Gateway Anti-Virus, a Vermont Department of Taxes project, allows applications

Project Part 2 It Security

953 words - 4 pages Classification Description: Malicious Code and Activity Task Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code


676 words - 3 pages off of the original Unix system. First we are going to talk about viruses and the myths and facts about them within these three operating systems. Generally people often associate viruses with Window’s (OS) and not with Linux or OS X. This isn’t true, each system is vulnerable and the reason why Windows appears to be more vulnerable is because it has more viruses programmed for it. The reason OS X doesn’t have as much is because hackers don’t

Importance Of Security Of Personal Belongingsg

642 words - 3 pages within that machine absolutely must be accountable for his or her actions or the entire thing may break down. None of it would be possible without accountability. Security is essential to maintain a functioning network and productive employees and soldiers. These security recommendations should be implemented to ensure a safe and secure operating network where there are minimal fears from outside influences such as viruses, spam and hacking

Netw Lab 12

335 words - 2 pages the space. 4. Driver Restore backs up your existing drivers and settings to create a restore point so that if you run into a similar issue in the future, the user would have an easy solution prepared. 5. When the user restores the system Lab 12.3 1. Disable Service helps you to disable services running in the background such as "push service”,” upload service" or "pull ad service" and so on. This would help keep out the viruses etc

Radical Leadership

714 words - 3 pages customers thus fulfilling the interpersonal role.  3.This case study is abut the management roles and management skills .There is a company name Symantec Corporation at Santa Monica, that deals with viruses that are very dangerous and dirtiest   and find out their solutions in order to provide the customer support and ease in their daily business life. The situation at Symantec is very unique and hard because of rapid change in the environment

Keeping Information Secure

1741 words - 7 pages leave your company. Use network logging and security tests to check your network for security holes and possible break-ins. Passwords One bad password can compromise your entire network. Avoid passwords that contain dictionary words or personal information, and require users to change their passwords regularly. When an employee leaves the company, disable their password immediately as part of the termination process. Viruses Computer

Similar Documents

Computer Viruses Essay

1026 words - 5 pages to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a good resource. The typical network attacks that put computers at risk are: viruses, worms, spoofing, Trojan horses and denial of service attacks. Every unprotected computer is vulnerable to a computer virus. Once the virus is in the computer it can spread throughout, infecting other files and potentially damaging the operating system itself. A

Week 1 Essay

345 words - 2 pages nine properties and how things like a virus, prion, and viroid can reproduce, but are not considered to be alive. Also how things like these that are not considered to be alive can “evolve”? Viruses reproduce via bacterial gene transfer. Prions are proteins so they replicate with the rest of the genome. Viroids are small RNA plant pathogens that do not code any protein products, therefore replicate by stealing what is needed from the host

Submit A 4 Page Paper Discussing Three Types Of Cybercrime Risks And How Organizations And Individuals Can Protect Themselves From These Schemes. Please Identify At Least One Real Life Exmaple And...

1097 words - 5 pages committed where the computer or electronic data device is integral to the criminal act (Kranacher, Riley, and Wells 114). Although many do not believe that they can cause any vital damage, cybercrimes such as wiretapping, piggybacking, and computer viruses can have significant repercussions on various organizations. By identifying the type of cybercrime, discussing how organizations can protect themselves from it, and multiple real-life examples, an

Disease & Evolution Essay

2793 words - 12 pages Disease and Evolution The human body has been plagued with diseases since the beginning of time—pathogens like viruses and bacteria have made us privy to Mother Nature. As humans evolve, so do the diseases we are susceptible to. Some diseases that were once rare have become common, others have disappeared and newer, more daunting ones have emerged. Many of these changes have taken place in the wake of important transformations in human