Tuesday, November 26, 2019

A Guide to Installing Microsoft Access 2010

A Guide to Installing Microsoft Access 2010 Due to its widespread availability and flexible functionality, Microsoft Access 2010 is still a popular database software in use today. Access 2010 introduced a version of the ACCDB file format that supported SharePoint, which allowed support for the Mac through a browser for the first time. New in Access 2010 was the Backstage view through which you can access all the commands for an entire database. The ribbon and navigation pane, which was introduced in Access 2007, is in Access 2010.   Benefits of Access 2010 Enhanced securityImproved spell checkerSharePoint supportNew user interfaceImproved data presentation How to Install Access 2010 The Access installation process is straightforward. Verify that your system meets the basic requirements for Access. Youll need at least a 500 MHz or faster processor with 256MB of RAM. Youll also need at least 3GB of free hard disk space.Ensure that your operating system is up to date. Youll need Windows XP SP3 or later to run Access 2010. Its a good idea to apply all security updates and hotfixes to your system before installing Access.Insert the Office CD into your CD-ROM drive. The installation process begins automatically and asks you to wait while the system prepares the Installation Wizard.The next step of the process prompts you to enter your product key and accept the terms of the license agreement.If youd like to install the entire Office suite or youre using an Access-only CD, you can choose Install Now on the next screen. If you want to customize your installation, click Customize instead.When the installation completes, you may be prompted to restart your computer. Go ahead and do so. After you install Access 2010, visit the Microsoft website for video tutorials on the software.

Saturday, November 23, 2019

Specific Heat Worked Example Problem

Specific Heat Worked Example Problem This worked example problem demonstrates how to calculate the specific heat of a substance when given the amount of energy used to change the substances temperature. Specific Heat Equation and Definition First, lets review what specific heat is and what equation you use to find it. Specific heat is defined as the amount of heat per unit mass needed to increase the temperature by one degree Celsius (or by 1 Kelvin). Usually, the lowercase letter c is used to denote specific heat. The equation is written: Q mcΔT (remember by thinking em-cat) where Q is the heat that is added, c is specific heat, m is mass and ΔT is the change in temperature. The usual units used for quantities in this equation are degrees Celsius for temperature (sometimes Kelvin), grams for mass, and specific heat reported in calorie/gram  °C, joule/gram  °C, or joule/gram K. You can also think of specific heat as heat capacity per mass basis of a material. When working a problem, youll either be given the specific heat values and asked to find one of the other values or else asked to find specific heat. There are published tables of molar specific heats of many materials. Note the specific heat equation does not apply for phase changes. This is because the temperature does not change. Specific Heat Problem It takes 487.5 J to heat 25 grams of copper from 25  °C to 75  °C. What is the specific heat in Joules/g ·Ã‚ °C?Solution:Use the formulaq mcΔTwhereq heat energym massc specific heatΔT change in temperaturePutting the numbers into the equation yields: 487.5 J (25 g)c(75  °C - 25  °C)487.5 J (25 g)c(50  °C)Solve for c:c 487.5 J/(25g)(50  °C)c 0.39 J/g ·Ã‚ °CAnswer:The specific heat of copper is 0.39 J/g ·Ã‚ °C.

Thursday, November 21, 2019

The Differences Between Islam And Christianity Essay

The Differences Between Islam And Christianity - Essay Example One of the reasons of the success of the Muslim conquest was that they were aided by the Christian and the Jews when Heraclius tried to attack the Muslims at a;-Yarmuk, due to the aid of the Christians and the Jews, the Muslim army outnumbered the army of Heraclius (FORDHAM, 2012). The Christians and the Jews decided to aid Muslims in their conquest when the Muslims threatened to return them to their former condition, at that time the Christians and the Jews decided to help the Muslims as they preferred living under Muslim Rule rather than Byzantine Rule. The second reason of the Muslim conquest during the war of al-Yarmuk was the unity among the Muslims, although the army led by al-Ghassani outnumbered the Muslim fighters by a great deal, still, the Muslims ended up being victorious. An instance that supports this reason is the participation of the Muslim females in the war. Ans 4.In accordance to the insulting stories produced by Christians during the 9th and the 10th century, the view they had about the Prophet Mohammed was a mass murderer and terrorist like (Constable 48). This can be seen through the views that he was provided with arms and swords to treat the Gog in a very cruel manner so the Cog would bow in front of him and perform activities which he wanted them to perform. Similarly, these stories state that he had ordered the followers of the religion of Islam to kill those who were not ready to accept Islam as their religion and to make sure that people accepted Islam with the aid of sword.

Tuesday, November 19, 2019

The Party is Over Essay Example | Topics and Well Written Essays - 750 words

The Party is Over - Essay Example Oil industry boomed especially during 1860 and 1900 when scientific and technological discoveries took place. Another oil pioneer that is credited for his contribution to the oil expansion is French engineer J.J. Etienne Lenoirn who with his discovery of first world internal combustion engine which depended much to the gasoline. Though it took almost 40 years to have clear automobile and interdependency of oil and industries, Lenoirn certainly paved the way for oil production with his innovation of internal engine combustion. In 1990, kerosene sky-rocketed the oil production due to the domestic usage of lighting and cooking, which later on the supply was affected by the invention of electric bulbs. After World War I, city construction in Europe paved the way for automobiles which later on increased oil production. Though most of war automobiles used fuel which was largely supplied by US, which led to the systemization of oil production, refining and shipping. Oil importance was vividly seen during this time which contributed much to the US economic growth. The US became the world superpower nation due to the wealth accumulated during the year of 1950 to 1965 which doubled again from year 1965 to 1980. Though an oil price has been fluctuating, oil and its products have been valuable resource which contributed much to the automakers together with oil companies in America. Though a link between auto industries and oil companies grew fast which saw more cars releases, other economic aspects also had positive impact to the country which made America to depend heavily on oil production to date. Due to it's heavily dependence on oil, America oil production started to decline which has made US looking for oil out of America. Oil revolution has not only changed Americans life, but the world as whole. US strike a deal of 50/50 split with Saudi Arabia which made US which assured US of more oil while Britain strike deal with Iran which later on was nationalised during the nationalism in Iran. Taking a good look at the trend of economic development around the world, especially in the oil producing countries, it is evidenced that these countries experienced a certain amount of conflicts. Apart from the conflicts, US have now become largest oil user, which cannot even meet the domestic demand. "Importation of oil to US has been increasing since 1970 which US has to make up for its shortfall from domestic production." (Richard Heinberg, The Party is Over, 2nd Edition 2005). US being the well-explored country have not managed to meet it domestic demand for oil. Being an industrial country, the oil production has to be high as well, the notion that has forced US to look for alternative in filling the gap of the energy required. In his book, Richard Heinberg described some of alternative energy sources like solar energy and atomic energy that could at least help in meeting the demand. . However, efforts to improve efficiency are subject to diminishing returns, and so eventually a point will be reached where reduced energy availability will translate to reduced economic activity. According to Richard Heinberg, US is the world's largest energy consumer, the centre of global industrial empire and, and the holder of the most powerful store of weaponry in world history. This might play vital role in shaping the geopolitics of the new century.

Sunday, November 17, 2019

The Future of Books Essay Example for Free

The Future of Books Essay 1. Introduction Books have evolved greatly since the first writings in clay tablets a thousand years B. C. to nowadays with the digital versions of most books that were, not long ago, only available in paper. Even though stories have been carried and passed from generation to generation since the emergence of language, only until around the fifth century has it been heard about books and their use. In the antiquity, primitive materials in which to carve such as stone and wood were replaced by finer and more portable materials like scrolls, papyrus and manuscripts, which allowed the writing of longer texts with less effort, and which lead the reading experience reaching an elite minority until the invention of the print. The history of books in modern times is directly related to the creation of the print, in the mid 15th century, by Gutenberg. This invention allowed texts to be translated and diffused, reaching much wider audiences and narrowing the knowledge gap between different social classes. The first book that Gutenberg printed was the bible, which completely revolutionized the way in which religion was regarded by the then illiterate masses, and which’s impact was then followed by a series of not only religious, but also more general cultural transformations when all types of books were reproduced and made accessible for the people. Printing made it possible for stories and knowledge to be materialized and kept throughout the years. With the advancements of the printing industry, books became easier to publish, cheaper and more attainable to people. The first printing machine had been made of wood and required a lot of hand labor and time to print, so the available copies of a book were still relatively limited. However, as the years passed, innovators sought better alternatives to wood and created metal and later on iron printing machines, which later on became mechanized, speeding up the printing process and not depending on an extensive hand labor to function. In 1867 the typewriter was invented, facilitating the typing process. With this invention, the price of books became more affordable and an increased number of readers appeared. The paper book trend lasted for centuries, gaining more audience and strength with each print innovation that was made. From Gutenberg up to the late 20th century, print books had an enormous success and growing popularity. However, with the raise of computer technologies, in 1971 the first digital library was finally created. 2. From Papers to Screens Project Gutenberg was founded in 1971 by Michael Hart, who created the first electronic book ever, with the principle of making literature accessible to everyone and to decrease the levels of illiteracy in the world. The project gathered the most important books in history in various languages, converted them into an electronic form and made them available to the public for free. This was a turning point in the history of books, since books were no longer read only by those who could afford their price in bookstores, but also by those who did not have the means to buy hardcovers and who now had easy and free access to literature and knowledge. Without knowing, Project Gutenberg started what would become the digital age of books by leading the transition from print books to digital books. When the advantages and the success of digital books were seen, a whole new market of online retailers began to take place. The emergence of e-books attracted other authors as well as electronics businesses that saw an opportunity for innovation and big profits. Electronic readers were created, facilitating the electronic reading experience and allowing people to read mobile e-books instead of being fixed to big heavy screens. However, during the 70’s and the 80’s, e-books were mainly specialized, and they attracted segments of the population who were interested in a few available topics. As the internet progressed in the 70’s and the 80’s and e-book electronic reading devices hit the markets, the 90’s Internet advancements allowed the easy spread of e-books from computer to computer through the web, and also the digitalization of a wide variety of genres. This meant that books were made available for people with all tastes and not only for a specialized audience. Reading was able to become a means of entertainment and not only of education and knowledge for the less favored classes, like it had been up to then. Books went from being expensive and unaffordable by many, to being a commodity of which everybody could enjoy. The higher number of genres and of books in the Internet created an increasing demand for e-books, from which online retailers, such as Amazon, took advantage in the mid 1990’s. Businesses took the opportunity to digitalize books and sell them online for cheaper prices than those of their original paper formats. Another big player in the internet was Google, which decided to pay publishers to digitalize books and make certain parts, if not all of them, available for free. Apart from the digitalization of books, reading devices such as Amazon’s Kindle, Barnes Noble’s Nook, and Apple’s Ipad show the huge market that was created due to e-books, and the competition that took and still takes place in the digital world for the monopoly of e-books. 3. Reading experience As mentioned above, thanks to the invention of the print, reading became a common activity and was no longer reserved for a privileged majority. As books spread, illiteracy levels dropped and the audience for books became so diverse that it allowed for the distribution of books of all genres for all cultures and tastes. It was probably thanks to the digitalization of books that sub-genres gained popularity and were not left and forgotten in the shelves of bookstores and libraries. E-books, therefore, revived dead genres and gave an advantage to the ones that already enjoyed from a big demand in paper format. The reading experience has thus changed regarding new audiences reached and more genres available for cheaper prices. Another way in which e-books have benefited the audiences has been through the creation of digital libraries by physical libraries as well as online libraries. Since e-books do not occupy shelf space and they need only to be stored in databases, it is easy for libraries to organize their digitalized books and for customers to find specific topics and authors. In this sense, the process of finding books has been simplified compared to the regular library systems for non-digital versions. The process of digitalization is a long one but once all books become part of the digital library, they are easier to manage and to distribute when people look for them. Electronic libraries allow the storage of large numbers of books in a small memory space, without the need of bookshelves, space and a large staff. Thanks to this storage advantage, libraries can have more books readily available and people have a larger choice and are not limited by the physical space of libraries. At the same time, bookstores with e-book archives can save customers time by giving a faster service and avoiding queues and waiting lists for books that for instance, have no yet arrived to the bookstore or due to distances or to a large demand. Apart from the storage aspects, an important part of the transition from paper to screens has been the unwillingness of certain people to adapt to the electronic forms of books. Hardcover books have been part of cultures for so many centuries that for some people it is not so easy to accommodate to e-readings. The modern world is incredibly digitalized, from music to movies, so the digitalization of books appears to be natural, particularly to the youngest generations. The reading experience between paper books and e-books is clearly different since paper books offer the possibility of reading with more senses alert. For instance, when reading a handcover book, the reader can feel the pages’ texture and the smell of the book, and can see traits that are not present in e-readers, such as worn out and bended pages, which could be seen as a disadvantage, but they can also give a rewarding sensation to the reader who makes his way through the book and can perceive and appreciate how he gets closer to the end. Another element of the charm of paper books is the unhurried reading experience that they offer. This implies the easiness with which books can be transported and the little it matters where the reader is in order to be able to do his reading. Contrary to e-readers, paper books do not require battery charging, careful care from bad weather conditions, uploading or downloading of stories, among other factors. Thus, paper books can be said to be simpler to read and to offer a genuine reading experience that only requires a book and a reader. Despite these reading experience factors, future generations will very probably grow being increasingly familiar with e-books, which will be in favor for the expansion of the e-book market and will result in a further shrinking demand for print books. Children born in the digital age are not be aware of the long way that print books have come from if they are not taught about it, and they probably regard e-books as the initial state of books. Therefore, the reading experience is linked by large to former reading experiences and to the capability to compare e-books to non-digital books from an intellectual and also sentimental or sensorial point of view. 4. Writers and Cost Reductions For writers, the digitalization of books does not necessarily imply negative consequences, since there are several points which are in their favor. These include the possibility of self-publishing, no need for paper, easy editing, and no surpluses. Self-publishing is a great advantage for writers since publishing houses usually get most of the gains, leaving the authors with minimal profits from their own books. By skipping the intermediary, which in this case is the publisher, writers can put their books up in the internet for sale and get all the profits. This approach does have its risks since the advantage of going public through publishers is that they know about the business and they take care of all the steps. There is also the advantage of not needing paper, which again means fewer costs and thus, more gains for the authors. Writers can decide to publish their books directly online without having a print version if they do not wish to. This saves writers from the long lasting period of printing and book assembling before their book is launched. Also, no printing means one intermediary less in the process of book publishing. Working with publishers already costs a lot of money, so cutting any price, in this case paper, printing and assembling prices, is helpful for authors. Related to the paper advantage, is easy editing. Contrary to print books, e-books can be easily edited even if they have been already published; they do not face the inconvenience of having typos that would cost a lot of money to correct. In the case of print books, once the book is printed in big numbers, typos are not possible to correct until the next printings, but by then the public will already have the version with the typos in their hands. Editing also refers to bigger editing other than typos, such as whole passage modifications, which are possible to make in digital versions but not in paper. Writers can also benefit from the lack of book surpluses that result in money put into the rental of warehouses. Surpluses are very common for print books since at the moment of publishing, authors and publishers make an estimate of the books that will be sold, but they might not always be right or even approximate, due to the quality of the writing or of other external factors. In the case of e-books, no printing is necessary and purchases are done digitally so no warehouses are needed. This saves the authors money and allows for investment in other areas such as the advertising of their books. 5. More Readers for Writers. Concerning the readers, they have easy access to books and do not depend merely on the prices offered, since paper books usually cost a lot of money. Even if some digital books can be more expensive than others because of publishers, they are considerably cheaper than paper books. Another advantage for the readers is that they do not need to physically move if they need or want to get an e-book. As mentioned before, they have the advantage of avoiding long library and bookstore queues and waiting lists, and they can have access to the book they want directly from the comfort of their home or computer. These advantages mean that readers look for their books online more readily than they look for physical books, since these require more time, money and efforts. Therefore, writers can benefit for a wider, or at least more active, audience. 6. E-books and Different Genres In the case of the genres affected by the digitalization of books, academic books most probably will not increase their sales and will not be reaching a wider audience, since these books have a specialized audience that does not increase or decrease its demands with the availability of e-books. On the other hand, novels and books of popular genres like science fiction will most probably increase their demand numbers, since they do not require a specialized audience, but can entertain people from all social strata. Science fiction alone accounts for around 20% of all e-book purchases. At the same time, since digital readings offer the possibility of hyperlinks, search engines, and so forth, within or around the text, these distractions affect the reading quality of novels, but not so much the reading quality of dictionaries and cookbooks, for instance. 7. Concerning Publishers. Some of the players who are the most affected by the digitalization of books are publishers, since moving to digital forms has reshaped in the way in which books are marketed and also the costs involved and profits earned. Some of the advantages to publishers are the liberation from the constraints of printing and from surpluses of inventories. Another advantage is that older books that stopped selling on print can be published again in their digital form and reach wider audiences because of the cheaper prices, so profits can be made from book print inactive books. Despite these advantages, the disadvantages are also great. One of the biggest threats of publishing online is piracy, since pirates can easily take the book and distribute it illegally. Another disadvantage is the pricing for e-books in the internet, since different retailers and sellers have at times prices that differ greatly from one another and while big retailers can afford to cut costs and increase sales with some profit losses, small publishers cannot afford such a move. One more important disadvantage for publishers is that there are no more book displays in bookstore shelves that help advertise books. Publishers try, however, to create advertising for their clients through the social web in order to make up for this downfall. A technique used by publishers in order to keep their print sales alive is called â€Å"windowing† and it consists of publishing first the print version of a new book and delaying the e-version to increase the print sales. The idea is not to let people know when the e-version will be available so that they buy the print version and do not wait for the e-book to be published. However, this technique can go wrong and can create losses if the time length between the print and online publishing is not well foreseen. For instance, if the print book is sold out after a week, when the planned time was two months, then people will quickly forget about the book and once it is finally published digitally, it will not have the same effect it had back when there was expectation for the two publishes. A second technique that publishers are using is the publication of segments of a book, which the public can read, and if they like what they see, they are encouraged to make donations so that the author can finish writing the book and that it can be published. This is a very innovative idea, since it allows publishers to avoid surpluses, as well as printing if they decide to do this only with e-books. 8. Libraries Libraries are one of the most important stakeholders of the digitalization of books since they are usually decades all and have invested great sums of money on the local, the books, the maintenance, and so forth. For libraries, the conversion of books into e-books is very expensive because even though it is cheaper than storing physical books, there are far more e-books and therefore, the storage in a digital form is more expensive in the long run. Fortunately for libraries, literature will still be literature and regarded as such, no matter if it’s stored in bookshelves or in databases. This means that library clients would still frequent the library when looking for books, and also because libraries are not just places where books are stored, but also cultural places where people can gather and talk about literature or intellectual topics. At the same time, due to the creation of digital databases, libraries will have to start cutting down personnel and spaces in order to be able to afford the transition to digital forms. 9. Bookstores: Borders In the case of bookstores, they suffer more than libraries from e-books, since bookstores are not a place of consultation but of selling, and when money is involved, customers tend to turn where they can spend the least for the same service. One of the main concerns of bookstores is the low price that is charged for books in e-form, since for the same content there are significant price differences that clearly draw clients away from bookstores to the internet. Another main concern of bookstores is that the space that is used for storing and displaying print books will not be of any use, and even if they create digital databases to sell e-books in their stores, they cannot compete with online venders since they still need to cover local costs such as electricity, personnel, rent, maintenance, etc. Some of the strategies tried out by bookstores in order to survive the digital age is to host book clubs and social gatherings, as well as selling goods other than books. In the case of smaller bookstores, since they cannot compete with the others’ prices, have opted for offering writing classes, for instance, in addition to selling books in their stores. These strategies work in some cases but in others they have not been able to save bookstores from collapsing. On July 2011, the American bookstore giant, Borders, liquidated all of its stores after it went Bankrupt in February 2011. Next with its end went 11,000 lost jobs. In an interview to Border’s President Mike Edwards, he says, Following the best efforts of all parties, we are saddened by this development. We were all working hard toward a different outcome, but the head winds we have been facing for quite some time, including the rapidly changing book industry, [electronic reader] revolution and turbulent economy, have brought us to where we are now. It is clear that Borders was not prepared for the digital wave that hit the book industry, and when it tried to react it was already too late. Borders had big stores and advanced equipment to locate books clients looked for. However, when the digitalization of books started taking place, Borders did not focus on building its own e-book market, but instead it used one of the above mentioned techniques, which was selling other goods, such as CDs and DVDs. It also invested on the infrastructure of its shops instead of taking action in the digital book market. Its main competitor was Barnes Noble, which has managed to survive and keep up by focusing on the promotion of e-books and on the release of its own e-reader, the Nook, which put it directly into the digital market and which allows it to better promote its own digital books. There is still much to be achieved and much competition to achieve from the part of Barnes Noble, but if it continues to accommodate to the digital flow then it is very likely that it will manage to sustain itself. For Borders, for Barnes Nobel, and for all bookstores nowadays, the big competitors are online retailers, especially Amazon, which is considered to be the biggest e-retailer on the web. 10. Online Retailers: Amazon Amazon was founded in the mid 1990’s and started off as an online book seller. With the years, it started expanding its market to multiple areas such as music, software, videogames and toys. Today, it sells an infinite variety of products and covers an international market as one of the biggest online retailers in the world. With the emergence of e-books and the enormous competition that surrounded Amazon, it decided not only to sell digital versions of its books but also to launch its own e-reader, the now famous Kindle. Its main adversary in terms of e-readers was and still is the iPad. In order to keep up with the competition and be the number one on the e-book market, Amazon lowered the price of the Kindle to a level where it was making no profits and was in the contrary, creating losses. The reasoning behind this strategy was to encourage people to buy the Kindle instead of other e-readers, and by buying the Kindle they would be likely to buy the e-books from Amazon too. Up to now, Amazon has been able to keep on competing with Apple, however, both are directed at different customers, since Apple’s iPad is more about design than about e-books, while Amazon’s Kindle is all about the e-books Amazon offers with it. The online retailer has the advantage on making its profits from a wide variety of products and not having to rely completely on e-books only. However, it is today the biggest e-retailer online and its e-books account for an important part of its success, and thanks to its Kindle and its prices it continues its way to dominating the e-book market. The future of Amazon is tightly related to the future of Bookstores and the future of print books. While Amazon continues to offer low prices for digital books, people will keep on turning to the cheaper digital versions and the demand for print books will keep on decreasing. At the same time, the international scope of Amazon and its prices make it difficult for bookstores to compete with it, since they rely on books mainly, while Amazon relies on many other products that it sells successfully online. 11. Conclusion The future of books seems to be as e-books mainly, even though the print versions will most probably continue to play an important role in society due to the historical and emotional charge that they carry. The generations  that grew up with print books are not likely to turn to digital forms too quickly, but as every year since the late 1990’s a new digital generation is born, print books will not have the same meaning they have today, just as they do not have the same meaning today as they had before the rise of the internet. In order for print books to survive, prices need to be lowered, and the most successful way to do this for authors is by self-publishing and reaching the audiences directly. This entails risks, but if print books continue to cost as much as they do today, the demand for them will decrease further with time. In the case of bookstores, for the moment they have no other alternative than to adapt to the digital market and to try to find other sources of income. Perhaps in the future, once the world is used to e-books, just like it is used to CD’s and not to cassettes today, people will look back and start turning to print versions which will be seen as unique and which might gain back the initial prestigious status that they once had when the print was first created. Works Cited Adam, Nabil R. Digital Libraries: Research and Technology Advances : ADL 95 Forum, McLean, Virginia, USA, May 15-17, 1995 : Selected Papers. Berlin: Springer, 1996. Print. Amazon: The Walmart of the Web. The Economist [San Francisco] 1 Oct. 2011: 57-58. Print. Amazons 15th Anniversary: A History of Online Shopping. Time. 16 July 2010. Web. http://www. time. com/time/business/article/0,8599,2004089,00. html. Archiving the Web: Born Digital. The Economist 23 Oct. 2010: 67. Print. Auletta, Ken. The IPad, the Kindle, and the Future of Books. The New Yorker. 26 Apr. 2010. Web. http://www. newyorker. com/reporting/2010/04/26/100426fa_fact_auletta. Background to Project Gutenberg. Project Gutenberg Australia. Web. http://gutenberg. net. au/background. html. Barnett, Emma. Self Publishing Writer Becomes Million Seller Telegraph. The Telegraph. 21 June 2011. Web. http://www. telegraph. co. uk/culture/books/booknews/8589963/Self-publishing-writer-becomes-million-seller. html. The Books Business: Great Digital Expectations. The Economist 10 Sept. 2011: 63-64. Print. Brooks, Sofie C. Publishing Words: The Future of Books | Arts | The Harvard Crimson. The Harvard Crimson. 20 Sept. 2011. Web. http://www. thecrimson. com/column/innovation-and-art/article/2011/9/20/publishing-books-amazon-new/. Cohen, Dan. The Fight Over the Future of Digital Books Dan Cohen Technology The Atlantic. The Atlantic. 23 Sept. 2011. Web. http://www. theatlantic. com/technology/archive/2011/09/the-fight-over-the-future-of-digital-books/245577/. Crowd-funding Books: A Novel Idea. The Economist 23 July 2011: 58. Print. Eliot, Simon, and Jonathan Rose. A Companion to the History of the Book. Malden, MA: Blackwell Pub. , 2007. Print. The Endangered Bookstore: Edited Out. The Economist 3 Apr. 2010: 60. Print. The Future of Books: Not Bound by Anything | The Economist. The Economist. 24 Mar. 2007. Web. http://www. economist. com/node/8881446. The Future of Publishing: E-publish or Perish. The Economist 3 Apr. 2010: 59-60. Print. The History of the Internet. Investintech. com. Web. http://www. investintech. com/content/historyinternet/. Howard, Nicole. The Book: the Life Story of a Technology. Baltimore: Johns Hopkins UP, 2009. Print. Kovacs, Maureen G. The Epic of Gilgamesh. Stanford, CA: Stanford Univ. , 2004. Print. Menn, Joseph. Alliance Helps Google Finally Go into Print with 2m Books. The Financial Times [San Francisco] 18 Sept. 2009: 13. Print. Michael Hart. The Economist 24 Sept. 2011, Obituary sec. : 102. Print. Montgomery, Kathryn C. Children in the Digital Age. Media Awareness Network. Web. http://www. media-awareness. ca/english/resources/special_initiatives/wa_resources/wa_shared/backgrounders/digital_kids. cfm. Noguchi, Yuki. Why Borders Failed While Barnes Noble Survived. National Public Radio. 9 July 2011. Web. http://www. npr. org/2011/07/19/138514209/why-borders-failed-while-barnes-and-noble-survived. Postrel, Virginia. Amazon vs. Apple: What Should E-Book Prices Be? The Atlantic. 2 Feb. 2010. Web. http://www. theatlantic. com/business/archive/2010/02/amazon-vs-apple-what-should-e-book-prices-be/35131/. Printing Yesterday and Today. Harry Ransom Center. Web. http://www. hrc. utexas. edu/educator/modules/gutenberg/books/printing/. Project Gutenberg. Web. http://www. gutenberg. org/wiki/Gutenberg:About. Spector, Mike. Borders Forced to Liquidate, Close All Stores. The Wall Street Journal. 19 July 2011. Web. http://online. wsj. com/article/SB10001424052702303661904576454353768550280. html. Sutter, John D. The Future of Libraries, with or without Books. CNN. 04 Sept. 2009. Web. http://articles. cnn. com/2009-09-04/tech/future. library. technology_1_metropolitan-library-librarians-books? _s=PM:TECH. The Transformation of the Book Industry: Disappearing Ink. The Economist 10 Sept. 2011: 15. Print. Wong, Jackie. Genre-fiction Fans Quell Hunger with E-books. Straight: Vancouvers Online Source. 7 July 2011. Web. http://www. straight. com/article-402353/vancouver/genrefiction-fans-quell-hunger-ebooks. [ 1 ]. Kovacs, Maureen G. The Epic of Gilgamesh (Stanford, CA: Stanford Univ. , 2004) 13. [ 2 ]. Eliot, Simon, and Jonathan Rose. A Companion to the History of the Book (Malden, MA: Blackwell Pub. , 2007) 87. [ 3 ]. Howard, Nicole. The Book: the Life Story of a Technology (Baltimore: Johns Hopkins UP, 2009) 31. [ 4 ]. Printing Yesterday and Today. Harry Ransom Center. . [ 5 ]. Background to Project Gutenberg. Project Gutenberg Australia. . [ 6 ]. Michael Hart. The Economist 24 Sept. 2011, Obituary sec. : 102. Print. [ 7 ]. The History of the Internet. Investintech. com.. [ 8 ]. Menn, Joseph. Alliance Helps Google Finally Go into Print with 2m Books. The Financial Times [San Francisco] 18 Sept. 2009: 13. [ 9 ]. Cohen, Dan. The Fight Over the Future of Digital Books Dan Cohen Technology The Atlantic. The Atlantic. 23 Sept. 2011. . [ 10 ]. Adam, Nabil R. Digital Libraries: Research and Technology Advances : ADL 95 Forum, McLean, Virginia, USA, May 15-17, 1995 : Selected Papers (Berlin: Springer, 1996) 244. [ 11 ]. The Future of Books: Not Bound by Anything | The Economist. The Economist. 24 Mar. 2007. . [ 12 ]. Montgomery, Kathryn C. Children in

Thursday, November 14, 2019

Biography of Augustus DeMorgan :: essays research papers

Augustus DeMorgan was an English mathematician, logician, and bibliographer. He was born in June 1806 at Madura, Madras presidency, India and educated at Trinity College, Cambridge in 1823. Augustus DeMorgan had passed away on March 18, 1871, in London.   Ã‚  Ã‚  Ã‚  Ã‚  Augustus was recognized as far superior in mathematical ability to any other person there, but his refusal to commit to studying resulted in his finishing only in fourth place in his class.   Ã‚  Ã‚  Ã‚  Ã‚  In 1828 he became professor of mathematics at the newly established University College in London. He taught there until 1806, except for a break of five years from 1831 to 1836. DeMorgan was the first president of London Mathematical Society, which was founded in 1866.   Ã‚  Ã‚  Ã‚  Ã‚  DeMorgan’s aim as a mathematician was to place the subject on a more rigorous foundation. As a teacher he was unrivaled, and no topic was too insignificant to receive his careful attention. In 1838 he introduced the term “ mathematical induction'; to differentiate between the hypothetical induction of empirical science and the rigorous method. Often used in mathematical proof, for advancing from n to n+I.   Ã‚  Ã‚  Ã‚  Ã‚  DeMorgan made his greatest contributions to knowledge. The renaissance of logical studies, which began in the first half of the 19th century, was due almost entirely to the writings of the two British mathematicians, DeMorgan and G. Boole. He always laid much stress upon the importance of logical training. His importance in the history of logic’s, however, primarily due to his realization that the subject as it had come down from Aristole was unnecessarily restricted scope. By reflecting on the processes of mathematics, he was led like Boole, to the conviction that a far larger number of valid inference were possible that had hitherto been recognized.   Ã‚  Ã‚  Ã‚  Ã‚  His most notable achievements were to lay the foundation for the theory of relations to prepare the way to rise of modern symbolic, or mathematical, logic. His name is commemorated in DeMorgan’s Law, which is usually presented in the concise alternative forms ~( pvq ) = ~p & ~q; and ~( p&q ) = `~p v ~q. These read not ( p or q ) equals not p or not q ; and not ( p and q ) equals not p or not q.   Ã‚  Ã‚  Ã‚  Ã‚  These statements assert that the negative ( or contradictory) of an alternative proposition is a conjunction which the conjuncts are the contradictions of the corresponding alternants. That the negative of a conjunctive is an alternative proposition in which the alternants are the contradictories of the corresponding conjuncts.

Tuesday, November 12, 2019

10 Worst Computer Viruses of All Time

10 Worst Computer Viruses of All Time Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable — according to Consumer Reports, computer viruses helped contribute to $8. 5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn't even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before prog rammers known as hackers began to build computer viruses. While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public's attention.A doctoral student named Fred Cohen was the first to describe self-replicating programs designed to modify computers as viruses. The name has stuck ever since. |Old-school Viruses | |Some of the earliest viruses to infect personal computers included the Apple Viruses, which attacked Apple II computers | |and the Brain virus, which could infect PCs. | In the good old days (i. e. , the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people.It wasn't until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itse lf via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses. We're going to take a look at 10 of the worst computer viruses to cripple a computer system. Let's start with the Melissa virus. Worst Computer Virus 10: Melissa In the spring of 1999, a man named David L. Smith created a computer virus based on a Microsoft Word macro.He built the virus so that it could spread through e-mail messages. Smith named the virus â€Å"Melissa,† saying that he named it after an exotic dancer from Florida [source: CNN]. [pic] Daniel Hulshizer/AFP/Getty Images A courtroom photo of David L. Smith, the alleged creator of the Melissa virus. Rather than shaking its moneymaker, the Melissa computer virus tempts recipients into opening a document with an e-mail message like â€Å"Here is that document you asked for, don't show it to anybody else. † Once activated, the virus repli cates itself and sends itself out to the top 50 people in the recipient's e-mail address book.The virus spread rapidly after Smith unleashed it on the world. The United States federal government became very interested in Smith's work — according to statements made by FBI officials to Congress, the Melissa virus â€Å"wreaked havoc on government and private sector networks† [source: FBI]. The increase in e-mail traffic forced some companies to discontinue e-mail programs until the virus was contained. After a lengthy trial process, Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization [source: BBC].Ultimately, the Melissa virus didn't cripple the Internet, but it was one of the first computer viruses to get the public's attention. Flavors of Viruses In this article, we'll look at several different kinds of computer viruses. Here's a quick guide to what we' ll see: †¢ The general term computer virus usually covers programs that modify how a computer works (including damaging the computer) and can self-replicate. A true computer virus requires a host program to run properly — Melissa used a Word document. †¢ A worm, on the other hand, doesn't require a host program.It's an application that can replicate itself and send itself through computer networks. †¢ Trojan horses are programs that claim to do one thing but really do another. Some might damage a victim's hard drive. Others can create a backdoor, allowing a remote user to access the victim's computer system. Next, we'll look at a virus that had a sweet name but a nasty effect on its victims. Worst Computer Virus 9: ILOVEYOU A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm — it was a standalone program capable of replicating itself.It bore the n ame ILOVEYOU. [pic] Robyn Beck/AFP/Getty Images A screenshot of the ILOVEYOU computer virus The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU. TXT. vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting [source: McAfee].According to anti-virus software producer McAfee, the ILOVEYOU virus had a wide range of attacks: †¢ It copied itself several times and hid the copies in several folders on the victim's hard drive. †¢ It added new files to the victim's registry keys. †¢ It replaced several different kinds of files with copies of itself. †¢ It sent itself through Internet Relay Chat clients as well as e-mail. †¢ It downloaded a file called WIN-BUGSFIX. EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.Who created the ILOVEYOU virus? Some think it was Onel de Guzman of the Philippines. Filipino authorities investigated de Guzman on charges of theft — at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages [source: Landler]. Gotcha! As if viruses, worms and Trojan horses weren't enough, we also have to worry about virus hoaxes.These are fake viruses — they don't actually cause any harm or replicate themselves. Instead, the creators of these viruses hope that people and media companies treat the hoax as if it were the real deal. Even though these hoaxes aren't immediately dangerous, they are still a problem. Like the boy who cried wolf, hoax viruses can cause people to ignore warnings about real threats. Now that the love fest is over, let's take a look at one of the most widespread viruses to hit the Web. Worst Computer Virus 8: The Klez Virus [pic] Joe Raedle/Getty Images Fortunately for consumers, there's no shortage of antivirus software suites on the market.The Klez virus marked a new direction for computer viruses, setting the bar high for those that would follow. It debuted in late 2001, and variations of the virus plagued the Internet for several months. The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book. Some variations of the Klez virus carried other harmful programs that could render a victim's computer inoperable. Depending on the version, the Klez virus could act like a normal computer virus, a worm or a Trojan horse.It coul d even disable virus-scanning software and pose as a virus-removal tool [source: Symantec]. Shortly after it appeared on the Internet, hackers modified the Klez virus in a way that made it far more effective. Like other viruses, it could comb through a victim's address book and send itself to contacts. But it could also take another name from the contact list and place that address in the â€Å"From† field in the e-mail client. It's called spoofing — the e-mail appears to come from one source when it's really coming from somewhere else. Spoofing an e-mail address accomplishes a couple of goals.For one thing, it doesn't do the recipient of the e-mail any good to block the person in the â€Å"From† field, since the e-mails are really coming from someone else. A Klez worm programmed to spam people with multiple e-mails could clog an inbox in short order, because the recipients would be unable to tell what the real source of the problem was. Also, the e-mail's recip ient might recognize the name in the â€Å"From† field and therefore be more receptive to opening it. Antivirus Software It's important to have an antivirus program on your computer, and to keep it up to date.But you shouldn't use more than one suite, as multiple antivirus programs can interfere with one another. Here's a list of some antivirus software suites: †¢ Avast Antivirus †¢ AVG Anti-Virus †¢ Kaspersky Anti-Virus †¢ McAfee VirusScan †¢ Norton AntiVirus Several major computer viruses debuted in 2001. In the next section, we'll take a look at Code Red. Worst Computer Virus 7: Code Red and Code Red II [pic] Chris Hondros/Getty Images The CERT Coordination Center at Carnegie-Mellon university published an advisory alerting the public to the dangers of the Code Red virus. The Code Red and Code Red II worms popped up in the summer of 2001.Both worms exploited an operating system vulnerability that was found in machines running Windows 2000 and Windo ws NT. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House. That means all the computers infected with Code Red tried to contact the Web servers at the White House at the same time, overloading the machines.A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That's because the worm creates a backdoor into the computer's operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it's bad news for the computer's owner. The person behind the virus can access information from the victim's computer or even use the infected computer to commit crimes. That means the victim not only has to deal with an infected computer, but also may fall under suspicion for crimes he or she didn't commit.While Windows NT machines were vulnerable to the Code Red worms, the viruses' effect on these machines wasn't as extreme. Web servers running Windows NT might crash more often than normal, but that was about as bad as it got. Compared to the woes experienced by Windows 2000 users, that's not so bad. Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. Once patched, the original worms could no longer infect a Windows 2000 machine; however, the patch didn't remove viruses from infected computers — victims had to do that themselves.What do I do now? What should you do if you find out your computer has been hit with a computer virus? That depends on the virus. Many antivirus programs are able to remove viruses from an infected system. But if the virus has damaged some of your files or data, you'll need to restore from backups. It's very important to back up your inform ation often. And with viruses like the Code Red worms, it's a good idea to completely reformat the hard drive and start fresh. Some worms allow other malicious software to load onto your machine, and a simple antivirus sweep might not catch them all.Worst Computer Virus 6: Nimda [pic] SMobile Systems The Symbian Skull Virus affects cell phones, causing them to display a series of skull images like this. Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks [source: Anthes]. The Nimda worm's primary targets were Internet servers.While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time. The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer's functions.On the other hand, if the victim was the administrator for the machine, the attacker would have full control. The spread of the Nimda virus caused some network systems to crash as more of the system's resources became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS) attack. Phoning it In Not all computer viruses focus on computers. Some target other electronic devices. Here's just a small sample of some highly portable viruses: †¢ CommWarrior attacked smartphones running the Symbian operating system (OS). The Skulls Virus also attacked Symbian phones and displayed screens of skulls instead of a home page on the victims' phones. †¢ RavMonE. exe is a virus that could infect iPod MP3 devices made between Sept. 12, 2006, and Oct. 18, 2006. †¢ Fox News reported in March 2008 that some electronic gadgets leave the factory with viruses pre-installed — these viruses attack your computer when you sync the device with your machine [source: Fox News]. Next, we'll take a look at a virus that affected major networks, including airline computers and bank ATMs. Worst Computer Virus 5: SQL Slammer/Sapphire pic] Chung Sung-Jun/Getty Images The Slammer virus hit South Korea hard, cutting it off from the Internet and leaving Internet cafes like this one relatively empty. In late January 2003, a new Web server virus spread across the Internet. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank o f America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.The culprit was the SQL Slammer virus, also known as Sapphire. By some estimates, the virus caused more than $1 billion in damages before patches and antivirus software caught up to the problem [source: Lemos]. The progress of Slammer's attack is well documented. Only a few minutes after infecting its first Internet server, the Slammer virus was doubling its number of victims every few seconds. Fifteen minutes after its first attack, the Slammer virus infected nearly half of the servers that act as the pillars of the Internet [source: Boutin].The Slammer virus taught a valuable lesson: It's not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn't widely known. While it's still impo rtant to try and head off viruses before they hit you, it's also important to have a worst-case-scenario plan to fall back on should disaster strike. A Matter of Timing Some hackers program viruses to sit dormant on a victim's computer only to unleash an attack on a specific date.Here's a quick sample of some famous viruses that had time triggers: †¢ The Jerusalem virus activated every Friday the 13th to destroy data on the victim computer's hard drive †¢ The Michelangelo virus activated on March 6, 1992 — Michelangelo was born on March 6, 1475 †¢ The Chernobyl virus activated on April 26, 1999 — the 13th anniversary of the Chernobyl meltdown disaster †¢ The Nyxem virus delivered its payload on the third of every month, wiping out files on the victim's computer Computer viruses can make a victim feel helpless, vulnerable and despondent.Next, we'll look at a virus with a name that evokes all three of those feelings. Worst Computer Virus 4: MyDoom [pi c] Alex Wong/Getty Images The MyDoom virus inspired politicians like U. S. Senator Chuck Schumer to propose a National Virus Response Center. The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus — there have been several variants — had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 2, 2004. Even after the virus stopped spreading, the backdoors created during the initial infections remained active [source: Symantec]. Later that year, a second outbreak of the MyDoom virus gave several search engine companies grief. Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication process. But it would also send a search request to a search engine and use e-mail addresses found in the search results. Eventually, searc h engines like Google began to receive millions of search requests from corrupted computers.These attacks slowed down search engine services and even caused some to crash [source: Sullivan]. MyDoom spread through e-mail and peer-to-peer networks. According to the security firm MessageLabs, one in every 12 e-mail messages carried the virus at one time [source: BBC]. Like the Klez virus, MyDoom could spoof e-mails so that it became very difficult to track the source of the infection. Oddball Viruses Not all viruses cause severe damage to computers or destroy networks. Some just cause computers to act in odd ways. An early virus called Ping-Pong created a bouncing ball graphic, but didn't seriously damage the infected computer.There are several joke programs that might make a computer owner think his or her computer is infected, but they're really harmless applications that don't self-replicate. When in doubt, it's best to let an antivirus program remove the application. Next, we'll ta ke a look at a pair of viruses created by the same hacker: the Sasser and Netsky viruses Worst Computer Virus 3: Sasser and Netsky [pic] David Hecker/AFP/Getty Images Sven Jaschan, creator of the Sasser and Netsky viruses, leaves the Verden Court. Sometimes computer virus programmers escape detection.But once in a while, authorities find a way to track a virus back to its origin. Such was the case with the Sasser and Netsky viruses. A 17-year-old German named Sven Jaschan created the two programs and unleashed them onto the Internet. While the two worms behaved in different ways, similarities in the code led security experts to believe they both were the work of the same person. The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems.It contacted those systems and instructed them to download the virus. The virus would scan ran dom IP addresses to find potential victims. The virus also altered the victim's operating system in a way that made it difficult to shut down the computer without cutting off power to the system. The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment [source: CERT]. As it spreads, it can cause a denial of service (DoS) attack as systems collapse while trying to handle all the Internet traffic.At one time, security experts at Sophos believed Netsky and its variants accounted for 25 percent of all computer viruses on the Internet [source: Wagner]. Sven Jaschan spent no time in jail; he received a sentence of one year and nine months of probation. Because he was under 18 at the time of his arrest, he avoided being tried as an adult in German courts. Black Hats Just as you'd find good and bad witches in Oz, you can find good and bad hackers in our world. One common term for a hacker who sets out to cre ate computer viruses or compromise system security is a black hat.Some hackers attend conventions like the Black Hat conference or Defcon to discuss the impact of black hats and how they use vulnerabilities in computer security systems to commit crimes. So far, most of the viruses we've looked at target PCs running Windows. But Macintosh computers aren't immune to computer virus attacks. In the next section, we'll take a look at the first virus to commit a Mac attack. Worst Computer Virus 2: Leap-A/Oompa-A [pic] Kevin Mazur Archive 1/WireImage/Getty Images We can thank â€Å"Weird Al† Yankovic for warning us of the dreaded â€Å"Stinky Cheese† virus.Maybe you've seen the ad in Apple's Mac computer marketing campaign where Justin â€Å"I'm a Mac† Long consoles John â€Å"I'm a PC† Hodgman. Hodgman comes down with a virus and points out that there are more than 100,000 viruses that can strike a computer. Long says that those viruses target PCs, not Mac comp uters. For the most part, that's true. Mac computers are partially protected from virus attacks because of a concept called security through obscurity. Apple has a reputation for keeping its operating system (OS) and hardware a closed system — Apple produces both the hardware and the software.This keeps the OS obscure. Traditionally, Macs have been a distant second to PCs in the home computer market. A hacker who creates a virus for the Mac won't hit as many victims as he or she would with a virus for PCs. But that hasn't stopped at least one Mac hacker. In 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list.The message contains a corrupted file that appears to be an innocent JPEG image. The Leap-A virus doesn't cause much harm to computers, but it does show that even a Mac computer can fall prey to malicious software. As Mac computers become more popular, we'll probably see more hackers create customized viruses that could damage files on the computer or snarl network traffic. Hodgman's character may yet have his revenge. Breaking into Song While computer viruses can pose a serious threat to computer systems and Internet traffic, sometimes the media overstates the impact of a particular virus.For example, the Michelangelo virus gained a great deal of media attention, but the actual damage caused by the virus was pretty small. That might have been the inspiration for the song â€Å"Virus Alert† by â€Å"Weird Al† Yankovic. The song warns listeners of a computer virus called Stinky Cheese that not only wipes out your computer's hard drive, but also forces you to listen to Jethro Tull songs and legally change your name to Reggie. We're down to the end of the list. What computer virus has landed the number one spot? Worst Computer Viru s 1: Storm WormThe latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer security experts first identified the worm. The public began to call the virus the Storm Worm because one of the e-mail messages carrying the virus had as its subject â€Å"230 dead as storm batters Europe. † Antivirus companies call the worm other names. For example, Symantec calls it Peacomm while McAfee refers to it as Nuwar. This might sound confusing, but there's already a 2001 virus called the W32. Storm. Worm. The 2001 virus and the 2006 worm are completely different programs. [pic] Gabriel Bouys/AFP/Getty ImagesProfessor Adi Shamir of the Weizmann Institute of Sciences in Israel is the leader of the Anti-Spyware Coalition. The Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet. Many versions of the Storm Worm fool the victim into downloading the application through fake links to news stories or videos.The people behind the attacks will often change the subject of the e-mail to reflect current events. For example, just before the 2008 Olympics in Beijing, a new version of the worm appeared in e-mails with subjects like â€Å"a new deadly catastrophe in China† or â€Å"China's most deadly earthquake. † The e-mail claimed to link to video and news stories related to the subject, but in reality clicking on the link activated a download of the worm to the victim's computer [source: McAfee]. Several news agencies and blogs named the Storm Worm one of the worst virus attacks in years.By July 2007, an official with the security company Postini claimed that the firm detected more than 200 million e-mails carrying links to the Storm Worm during an attack that spanned several days [source: Gaudin]. Fortunately, not every e-mail led to someone downloading the worm. Although the Storm Worm is widespread, it's not the most difficult virus to detect or remove from a computer system. If you keep your antivirus software up to date and remember to use caution when you receive e-mails from unfamiliar people or see strange links, you'll save yourself some major headaches. MalwareComputer viruses are just one kind of malware. Other types include spyware and some kinds of adware. Spyware spies on what a user does with his or her computer. That can include logging keystrokes as a way to discover login codes and passwords. Adware is a software app that displays ads to users while they use a larger application like a Web browser. Some adware contains code that gives advertisers extensive access to private information. Want to learn more about computer viruses? Take a look at the links on the next page, if you dare. COMPUTER VIRUSES Markus Hanhisalo Department of Computer ScienceHelsinki University of Technology Markus. [email  protected] fi This report briefly introduces computer viruses and how they effect network security. I have introduced today's virus situation. Many people are afraid of viruses, mostly because they do not know much about them. This report will guide you in the event of a virus infection. Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems. [pic] Table of Contents 1. Introduction to computer viruses 2. General information about computer viruses . 1 Different Malware types 2. 1. 1 Viruses 2. 1. 2 Trojan 2. 1. 3 Worms 2. 2 Macro viruses 2. 3 Virus sources 2. 3. 1 Why do people write and spread viruses? 2. 4 How viruses act 2. 4. 1 How viruses spread out 2. 4. 2 How viruses activate 2. 5 Viruses in different platforms 2. 5. 1 PC viruses 2. 5. 2 Macinto sh viruses 2. 5. 3 Other platforms 3. How to deal with viruses 3. 1 What are the signs of viruses 3. 2 What to do when you find viruses 4. How to protect from viruses 4. 1 How to provide against viruses 4. 2 Different anti-virus programs 5. Computer viruses in Finland 5.   Ã‚  Ã‚   A questionnaire survey in Finland about viruses 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland 6. How computer viruses have spread out around the world 7. Computer viruses and network security 8. Conclusions [pic] 1. Introduction to Computer Viruses The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened.The next thing usually the person whose computer might be infected with virus, panics. The person might think t hat all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick?They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site.There w as a time when people were able to be sure that some sites we secure, that those secure sites did not have any virus problems, but nowadays the people can not be sure of anything. There has been viruses even in Microsoft's download sites. In this report I am going to introduce different malware types and how they spread out and how to deal with them. Most common viruses nowadays are macro viruses and I am going to spend a little more time with them. I am going to give an example of trojan horses stealing passwords. 2. General information about computer viruses 2. 1 Different malware typesMalware is a general name for all programs that are harmful; viruses, trojan, worms and all other similar programs [1]. 2. 1. 1  Ã‚  Ã‚   Viruses A computer virus is a program, a block of executable code, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user. There are a couple of different types of computer viruses: bo ot sector viruses, parasitic viruses, multi-partite viruses, companion viruses, link viruses and macro viruses. These classifications take into account the different ways in which the virus can infect different parts of a system.The manner in which each of these types operates has one thing in common: any virus has to be executed in order to operate. [2] Most viruses are pretty harmless. The user might not even notice the virus for years. Sometimes viruses might cause random damage to data files and over a long period they might destroy files and disks. Even benign viruses cause damage by occupying disk space and main memory, by using up CPU processing time. There is also the time and expense wasted in detecting and removing viruses. 2. 1. 2  Ã‚  Ã‚   Trojan A Trojan Horse is a program that does something else that the user thought it would do.It is mostly done to someone on purpose. The Trojan Horses are usually masked so that they look interesting, for example a saxophone. wav f ile that interests a person collecting sound samples of instruments. A Trojan Horse differs from a destructive virus in that it doesn't reproduce. There has been a password trojan out in AOL land (the American On Line). Password30 and Pasword50 which some people thought were wav. files, but they were disguised and people did not know that they had the trojan in their systems until they tried to change their passwords. 9] According to an administrator of AOL, the Trojan steals passwords and sends an E-mail to the hackers fake name and then the hacker has your account in his hands. 2. 1. 3  Ã‚  Ã‚   Worms A worm is a program which spreads usually over network connections. Unlike a virus which attach itself to a host program, worms always need a host program to spread. In practice, worms are not normally associated with one person computer systems. They are mostly found in multi-user systems such as Unix environments. A classic example of a worm is Robert Morrisis Internet-worm 1988. [1,5] [pic] Picture 1  Ã‚  Ã‚   An example of a worm. . 2 Macro virus Macro viruses spread from applications which use macros. The macro viruses which are receiving attention currently are specific to Word 6, WordBasic and Excel. However, many applications, not all of them Windows applications, have potentially damaging and infective macro capabilities too. A CAP macro virus, now widespread, infects macros attached to Word 6. 0 for Windows, Word 6. 0. 1 for Macintosh, Word 6. 0 for Windows NT, and Word for Windows 95 documents. What makes such a virus possible is that the macros are created by WordBASIC and even allows DOS commands to be run.WordBASIC in a program language which links features used in Word to macros. A virus, named â€Å"Concept,† has no destructive payload; it merely spreads, after a document containing the virus is opened. Concept copies itself to other documents when they are saved, without affecting the contents of documents. Since then, however, other macro viruses have been discovered, and some of them contain destructive routines. Microsoft suggests opening files without macros to prevent macro viruses from spreading, unless the user can verify that the macros contained in the document will not cause damage.This does NOT work for all macro viruses. Why are macro viruses so successful? Today people share so much data, email documents and use the Internet to get programs and documents. Macros are also very easy to write. The problem is also that Word for Windows corrupts macros inadvertently creating new macro viruses. [pic] Picture 2  Ã‚  Ã‚   New macro virus by corruption [12] Corruption's also creates â€Å"remnant† macros which are not infectious, but look like viruses and cause false alarms. Known macro virus can get together and create wholly new viruses. [pic]Picture 3  Ã‚  Ã‚   Macro virus growth, July 1995 to May 1997 [12] There have been viruses since 1986 and macro viruses since 1995. Now about 15 percent o f virus are macro viruses. There are about 2. 000 macro viruses and about 11. 000 DOS viruses, but the problem is that macro viruses spreads so fast. New macro viruses are created in the work-place, on a daily basis, on typical end-user machines, not in a virus lab. New macro virus creation is due to corruption, mating, and conversion. Traditional anti-virus programs are also not good at detecting new macro viruses.Almost all virus detected in the Helsinki University of Technology have been macro viruses, according to Tapio Keihanen, the virus specialist in HUT. Before macro viruses it was more easy to detect and repair virus infections with anti-virus programs. But now when there are new macro viruses, it is harder to detect macro viruses and people are more in contact with their anti-virus vendor to detect an repair unknown macro viruses, because new macro viruses spread faster than new anti-virus program updates come up. 2. 3 Virus sources Viruses don not just appear, there is al ways somebody that has made it and they have own reason to so.Viruses are written everywhere in the world. Now when the information flow in the net and Internet grows, it does not matter where the virus is made. Most of the writers are young men. There are also few university students, professors, computer store managers, writers and even a doctor has written a virus. One thing is common to these writers, all of them are men, women do not waste their time writing viruses. Women are either smarter or they are just so good that never get caught. [1] 2. 3. 1 Why do people write and spread viruses? It is difficult to know why people write them.Everyone has their own reasons. Some general reasons are to experiment how to write viruses or to test their programming talent. Some people just like to see how the virus spreads and gets famous around the World. The following is a list from news group postings alt. comp. virus and tries to explain why people write and spread viruses. ?   they don't understand or prefer not to think about the consequences for other people ? they simply don't care ?   they don't consider it to be their problem if someone else is inconvenienced ? hey draw a false distinction between creating/publishing viruses and distributing them ? they consider it to be the responsibility of someone else to protect systems from their creations ? they get a buzz, acknowledged or otherwise, from vandalism ? they consider they're fighting authority ? they like ‘matching wits' with anti virus vendors ? it's a way of getting attention, getting recognition from their peers and their names (or at least that of their virus) in the papers and the Wild List ? they're keeping the anti virus vendors in a job . 4 How viruses act Viruses main mission is to spread out and then get active. Some viruses just spread out and never activate. Viruses when they spread out, they make copies of self and spreading is harmful. 2. 4. 1  Ã‚  Ã‚   How viruses spread out Vi ruses mission is to hop from program to other and this should happen as quickly as possible. Usually viruses join to the host program in some way. They even write over part of the host program. A computer is infected with a boot sector virus if it is booted from an infected floppy disk. Boot sector infections cannot normally spread across a network.These viruses spread normally via floppy disks which may come from virtually any source: ? unsolicited demonstration disks ? brand-new software ? disks used on your PC by salesmen or engineers ? repaired hardware A file virus infects other files, when the program to which it is attached is run, and so a file virus can spread across a network and often very quickly. They may be spread from the same sources as boot sector viruses, but also from sources such as Internet FTP sites and newsgroups. Trojan horses spread just like file viruses. A multipartite virus infects boot sectors and files.Often, an infected file is used to infect the boot sector: thus, this is one case where a boot sector infection could spread across a network. 2. 4. 2  Ã‚  Ã‚   How viruses activate We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate. Some viruses just spread out, but when viruses activate they do very different things. Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files. As an example, in one unnamed company: over a long period of time, the files in a server were corrupted just a bit.So backup copies were taken from the corrupted files. And after they noticed that something was wrong, it was too late to get back the data from the backups. That kind of event is the worst that can happen for the uses. There is also talk that viruses have done something to hardware like hard disk or monitor. Viruses can not do any harm to hardware but they can do harm to programs and for e xample to BIOS so that computer does not start after that. Usually you can start the computer from a boot diskette if the computer does not start otherwise. 2. 5  Ã‚  Ã‚   Viruses in different platforms 2. 5.   Ã‚  Ã‚   PC viruses Viruses are mostly written for PC-computers and DOS environment. Even though viruses are made for DOS environment, they are working also in Windows, Windows95, Windows NT and OS/2 operating systems. Some viruses like boot sector viruses, do not care what about operating systems. [1] 2. 5. 2  Ã‚  Ã‚   Macintosh viruses Macintosh viruses are not as a big problem as PC viruses are. There are not so many viruses in Macintosh operating system. Macintosh viruses has been found mostly from schools. How many Mac viruses there are? I found out that there are about 2-300 Mac-specific viruses.There are virtually no macro viruses which have a Mac-specific payload, but all macro viruses can infect on Macs and other platforms which runs Word 6. x of better. 2. 5. 3  Ã‚  Ã‚   Other platforms Viruses can be found from in almost any kind of computer, such as HP calculators used by students like HP 48-calculators and old computers like Commodore 64 and Unix computers too. [1] In general, there are virtually no non-experimental UNIX viruses. There have been a few Worm incidents, most notably the Morris Worm,. the Internet Worm, of 1988. There are products which scan some Unix systems for PC viruses.Any machine used as a file server (Novell, Unix etc. ) can be scanned for PC viruses by a DOS scanner if it can be mounted as a logical drive on a PC running appropriate network client software such as PC-NFS. Intel-based PCs running Unix e. g. Linux, etc. can also be infected by a DOS boot-sector virus if booted from an infected disk. The same goes for other PC-hosted operating systems such as NetWare. While viruses are not a major risk on Unix platforms, integrity checkers and audit packages are frequently used by system administrators to detect fi le changes made by other kinds of attack. . How to deal with viruses 3. 1  Ã‚  Ã‚   What are the signs of viruses Almost anything odd a computer may do, can blamed on a computer â€Å"virus,† especially if no other explanation can readily be found. Many operating systems and programs also do strange things, therefore there is no reason to immediately blame a virus. In most cases, when an anti-virus program is then run, no virus can be found. A computer virus can cause unusual screen displays, or messages – but most don't do that. A virus may slow the operation of the computer – but many times that doesn't happen.Even longer disk activity, or strange hardware behavior can be caused by legitimate software, harmless â€Å"prank† programs, or by hardware faults. A virus may cause a drive to be accessed unexpectedly and the drive light to go on but legitimate programs can do that also. One usually reliable indicator of a virus infection is a change in the le ngth of executable (*. com/*. exe) files, a change in their content, or a change in their file date/time in the Directory listing. But some viruses don't infect files, and some of those which do can avoid howing changes they've made to files, especially if they're active in RAM. Another common indication of a virus infection is a change to the reassignment of system resources. Unaccounted use of memory or a reduction in the amount normally shown for the system may be significant. In short, observing â€Å"something funny† and blaming it on a computer virus is less productive than scanning regularly   for potential viruses, and not scanning, because â€Å"everything is running OK† is equally inadvisable. 3. 2  Ã‚  Ã‚   What to do when you find viruses First thing what you should do when you find virus is count to ten and stay cool.You should keep notes on what you do and write down what your virus programs and you computer tells you. If you are not sure what to do, you should call the administrator for future action. In some cases it is not good to start you computer from hard disk, because the virus may active and then do some harm. Second,make sure that you should get sure that it is virus and what virus it is. It is important to know what kind of virus we are dealing with. Companies that make anti-virus programs knows what different viruses does and you can ether call them and ask about that viruses or you can go to their web pages and read about the virus you have.When you start you computer you should do it from a clean (non-infected) floppy diskette and after that run the virus program. The boot diskette should be write protected so that virus can not infect the boot diskette too. [6] It is good to take a backup of the file that was infected. Virus program could do some damage to the file and that is why it is good to have a backup. It is good to let you administrator to know about the virus, so viruses would not spread around so much. I n TKK PC classes are protected by anti-virus program and that virus program reports to a person, responsible for virus protection. . How to protect from viruses 4. 1  Ã‚  Ã‚   How to provide against viruses Best way to protect yourself is to prepare your computer against viruses in advance. One way to protect you computer is to use updated anti-virus program. When you get an email attachment, you should first check the attachment by checking the file with a anti-virus program. As an example in one unnamed Finnish company all information was mailed in email attachments. There was this one Word document that was mailed to everybody. That email attachment was infected by a macro virus.Everyone got the infected attachment and those who opened that attachment by Word got that CAP-macro virus. After all there were a few thousand infections. It took lots of time and money to clear that virus. One can protect the computer against boot sector viruses by setting the BIOS to start from a har d disk rather than from a floppy disk. Write protection is a good way to prohibit against viruses. Write protection works well in floppy disks, Windows NT and UNIX, but not that well in Windows and Windows95. 4.   Ã‚  Ã‚   Different anti-virus programs There are three different kind of anti-viral packages: activity monitors, authentication or change-detection software, and scanners. Each type has its own strengths and weaknesses. Commercial anti-viral programs have a combination of the above mentioned functions. [7] There are over ten good anti-viral programs. Most knows programs are Data Fellows F-Prot, EliaShim ViruSafe, ESaSS ThunderBYTE, IBM AntiVirus, McAfee Scan, Microsoft Anti-Virus, Symantec Norton AntiVirus and S&S Dr Solomon's AVTK.On a day-to-day basis, the average corporation should be very interested in the scan time; these impact strongly the users, who should be scanning hard drives and disks on a daily basis. If a product takes too long to carry out these basic tas ks, users will be unwilling to wait, and will stop using it. This is clearly undesirable – the perfect anti-virus product would be one which takes no time to run and finds all viruses. 5. Computer viruses in Finland 5. 1  Ã‚  Ã‚   A questionnaire in Finland about viruses Computer viruses are not uncommon in Finland, especially not in schools and universities. Virus prevention was not well organized in some organizations and tended to be better in government organizations than in local government or in firms† writes Marko Helenius in his Computer viruses in Finland report. He did a large scale questionnaire survey in Finland in the summer 1993. There were not macro viruses at that time yet, so today the virus situation is a bit different, but some results were pretty interesting. The knowledge of viruses was quite poor in all sectors: government, local authorities and companies. Respondents' knowledge of viruses was best in government organizations.How importance is vi rus prevention? The most positive attitude to virus prevention was in government organizations. 90% of the government organizations used some kind of anti-virus program, the same in local authority organizations was about 55 % and in companies it was over 60 %. [3] 5. 2  Ã‚  Ã‚   It is going to be a criminal act to make viruses in Finland There is a new government bill about writing and spreading viruses. If the bill goes through, it is going to be a criminal act to make and spread viruses in Finland and one could get two years in prison or a fine, if one spread or write viruses.If a person make a virus it would be same thing in court than a person were planning to burn something. It is criminal to make viruses in England, Italy, Netherlands, Switzerland and Russia. It is not punished to make or spread viruses in Finland, according today's penal code. If viruses make harm to somebody that could be punished. Nobody has been punished for that in Finland, even though some Finns has m ade viruses, for example Finnish Spryer. That virus formatted about 600 hard disks and did lots of damage. They say that it was made in Espoo, but they never got the persons that made that virus.Virus business in Finland is pretty big. Businesses that have specialized in viruses have about 100 million in sales together. It costs money to stop working and clean up the viruses. Computer viruses put in danger general safety, says Pihlajamaki from Ministry of Justice. It is dangerous if viruses gets to programs that control trains or airplanes. Computer viruses can also be used as a weapon. It is sad that America used computer viruses to slay and to make Iraq's computers non-functional. [4] 6. How computer viruses have spread out around the world Computer viruses are a problem all over the world.The following picture tells us how many times people have accessed Data Fellows, a company that makes anti-virus program F-Prot, more than 1,672,846 per month[10]. It means that people are inter esting in virus information. One reason is that people have to deal with viruses. Viruses in not only a problem in Finland and USA, it is a problem around the world. [pic] Picture 4  Ã‚  Ã‚   Accesses per month Today's most common virus is the macro virus. Cap virus is one of the macro viruses. Last month there were 3100 Cap macro virus accesses during the last 30 days in Data Fellows.Next common virus was Join the Crew with 1171 accesses and third common was Pen pal Greetings with 895 accesses. [10] [pic] Picture 5  Ã‚  Ã‚   Twenty most accessed virus descriptions during the last 30 days 7. Computer viruses and network security Computer viruses are one network security problem. A few people when asked if computer viruses can cause network security problems answered as follows. Dave Kenney answered from National Computer Security Assoc: â€Å"There is one macro virus for MSWord that is received as an attachment to MS Mail messages. If a user has Word open, and double clicks to see the ontents of the attachment, MS Word and the open document is infected. Then the document is mailed to three other users listed in the original user's address book. † â€Å"The only information that is leaked is the thing you should be worried about, your password! The trojan sends an E-mail to the hackers fake name and then he has your account at his hands,† wrote CJ from American Online. â€Å"Rarely, a Word macro virus may accidentally pick up some user information and carry it along; we know of one case where a macro virus â€Å"snatched† an innocent user macro that contained a password, and spread it far outside the company where that happened.In the future, however, it is entirely possible that more network-aware viruses will cause significant network security problems,† wrote David Chess from IBM. Marko Helenius wrote from Virus Research Unit, that there has been some cases when hackers have used trojan horses to gain information. There is one example in one finnish corporation where some money were transferred illegally a year ago. There has been a trojan in the University of   Tampere too where the trojan pretend to be a host transfer program. The trojan saved users login name and password to hard disk. 8.Conclusions There are lots of viruses in the world and new viruses are coming up every day. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. There might be a virus in your computer if it starts acting differently. There is no reason to panic if the computer virus is found. It is good to be a little suspicious of malware when you surf in the Internet and download files. Some files that look interesting might hide a malware.A computer virus is a program that reproduces itself and its mission is to spread out. Most viruses are harmless and some viruses might cause random dam age to data files. A trojan horse is not a virus because it doesn't reproduce. The trojan horses are usually masked so that they look interesting. There are trojan horses that steal passwords and formats hard disks. Marco viruses spread from applications which use macros. Macro viruses spreads fast because people share so much data, email documents and use the Internet to get documents. Macros are also very easy to write.Some people want to experiment how to write viruses and test their programming talent. At the same time they do not understand about the consequences for other people or they simply do not care. Viruses mission is to hop from program to other and this can happen via floppy disks, Internet FTP sites, newsgroups and via email attachments. Viruses are mostly written for PC-computers and DOS environments. Viruses are not any more something that just programmers and computer specialist have to deal with. Today everyday users have to deal with viruses.

Saturday, November 9, 2019

Cultural Perspectives in Education Essay

The word ‘Culture’ refers to civilization or human activity. It can also refer to universal human capability to categorize skills, and to train and convey them characteristically. Therefore, one can say that Culture evolves over a period of time in response to adaptive challenges. What activities are carried out, who should participate, why they are valued and the rules of interaction are coded into the cultural models. There are different ways to educate, express or reveal knowledge to a student. The student’s education very much depends upon the teacher’s philosophy of education. This philosophical point of view appears to be true that could bring a negative influence in the classroom, no matter what syllabus is designed for the student. The students possess different qualities and beliefs that teachers should realize and learn to adapt to in the classroom. If teachers are not able to go beyond the boundaries of social class, religion, race, creed, gender, sex, disability or cultural background, then the focus of the students will also turn heavily upon differences and the classification of students as special needs or underachiever, thus building insensitive pre-expectations toward students in the classroom. â€Å"The primary goal of education is to show students different points of view and encourage them to evaluate their own beliefs. The teacher should help the students to appreciate how one’s observations and interpretations are influenced by social identity and background†. Chang, H. (1993). Students should be allowed to feel free to voice an opinion and empowered to defend it. A student is able to focus on and enjoy learning more when the school and classroom make him feel safe-comfortable with himself and with his surrounding. The learning situation should be made culturally neutral by keeping in mind the potential barriers and obstacles that each student may have. Taking this into account Marda Steffey (2001) suggests a four point motivational framework for culturally open teaching: 1. Establishing inclusion—norms, procedures, and structures woven together to form a learning context in which all learners and teachers feel respected by and connected to one another. 2. Developing attitude—â€Å"norms, procedures and structures that create through relevance and choice a favorable disposition among learners and teachers toward the learning experience or learning goal. 3. Enhancing meaning—norms, procedures, and structures that expand, refine, or increase the complexity of what is learned in a way that matters to learners, includes their values and purposes, and contributes to a critical consciousness. 4. Engendering competence—norms, procedures, and structures that create an understanding for learners of how they are or can be effective in learning something of personal value†. (Nawang, 1999) The main idea of the four points is that when student and teachers find themselves submerged in a unique world of the classroom, the interaction of culture is invaluable for the success of the learning process. Solomon, B. B. (1991). Teacher should recognize any biases or stereotypes in the class room, â€Å"by treating each student as an individual, and respect each student for whom he or she is. Amend any language practices or examples that exclude or degrade any group, should be aware of how students feel about the cultural climate in the classroom†. (Woolbright, 1989) A productive education must start with an awareness of these issues and some basic schemes for overcoming them. Although a variety of teachings can be fruitful, it seems especially cooperative to offer an atmosphere where students can easily hold an open discussion rather than class session in which a correct answer is required. True open discussion will send a message of authority between equal students who have something substantial to add to a common endeavor. Sharing the facts and principles of one’s discipline with students is very important as that helps to prepare an environment of comfort, trust and joint respect. Therefore, such an environment makes it possible for people to exchange ideas and thoughts on complex and often terrifying issues. It opens a way for students to carry out a common ground of joint practices and respect which can bind students together and at the same time make it easier for them to understand and observe many differences. The teacher should not only establish a content of diversity but a procedure that creates and demonstrate appreciation of diversity. It is important to keep in mind that students always observe and learn their teachers’ behavior as well as their expressions. The classroom environment not only represent the fundamental value of appreciation of diversity of cultures nevertheless it also capitulate great rewards in terms of vital thinking skills, especially the aptitude to value sophisticated multiple point of views on complex rational and ethical issues. The school or college should recognize all of the various types of diversities, whether it is cultural or not. Students should understand when they go their classroom that they will be interacting with many different types of students from all walks all of life. Levinson, B. A. , and Holland, D. (1996). They should understand that they are all in this facility for a reason and that it doesn’t matter what they look like or what language they speak, they need to cooperate to make their class environment more conducive to learning. It is very unfortunate to say that not much improvement in this has been made around the world except few countries, while in rest there is still school and colleges where cultural factors are given preferences. Every discipline is influenced by the inequity of power that exists across racial and cultural groups, between genders, and among other socially created classes of difference. In spite of advances in race and cultural relations, gender equality, and religious tolerance, significant documented differences continues to exist around the world. In order to gain a true moderate education, school administration should honor diversity of cultures. It should recognize holidays of other ethnicities and always study new and interesting ways of life. The students of the respective schools and colleges should â€Å"love learning about other cultures and how they interact with one another†. (Harold, 2006) The students should be allowed to do arts and projects that are representatives of other cultures and take great pride in the fact that they now have knowledge of their brothers and sisters around the world. Educators have a responsibility to assist the people who are privileged enough to be students in becoming aware of the inequalities around them. Therefore, each educator should work to infuse each class with the diverse voices that contributed to the knowledge base of the discipline. References Chang, H. (1993) Affirming Children’s Roots: Cultural and Linguistic Diversity in Early Care and Education: California Tomorrow. Hodgkinson, Harold L. (2006) Education in Social and Cultural Perspectives: Prentice-Hall Levinson, B. A. , and Holland, D. (1996). The cultural production of the educated person: An introduction. In B. A. Levinson, D. Foley, and D. Holland (Eds. ), Albany: SUNY Press. Phuntsog, Nawang. Magic of culturally responsive pedagogy: In search of the Genie’s lamp in multicultural education. Teacher Education Quarterly, Summer 1999 Solomon, B. B. (1991) Impediments to Teaching a Culturally Diverse Undergraduate Population: Kendall/Hunt Publishing. Woolbright, C. (Ed. ). (1989) Valuing Diversity on Campus: A Multicultural Approach. Bloomington, Ind. : Association of College Unions-International.