1.What are the settlement outcomes for refugees in Europe. (e.g. labour market participation, use of provincial income support, impact of language requirement for citizenship, impact of religion/spirituality)?
2.Describe the true threat posed by viruses and virus hoaxes and their effects on computers and productivity.
1.Difference between boot viruses, file viruses, network viruses and macro viruses.
A boot virus is also sometimes referred to as boot sector virus is able to infect and target a crucial section of computer system which contains information crucial to proper functioning of OS (operating system). It mainly targets the boot record ("Boot virus Description | F-Secure Labs", 2018).
As the name suggests, file virus is a form of malware that is known to infect executable files. This type of virus inserts infected code into executable files or overwrites codes. This type of infection causes permanent damage and makes the system unstable.
For a network virus, as the name suggests is a type of virus that infects devices on a network. This virus has the capability to degrade performance of a network and can disable critical devices. Worms which is a network virus can use protocols specific to the network to infect and spread other systems.
In terminology concerning computing, a virus written in macro language is termed as macro virus. Macro language is embedded in a software application. Microsoft office and excel has macro programs inbuilt and this is the reason why these viruses can spread through attachments.
2.Threat posed by virus and virus hoaxes.
There is a similarity between regular virus and computer viruses. Computer viruses are special programs which are specifically designed to enter a system undetected and like regular viruses, they start replicating ("What Is A Computer Virus?", 2018). A virus is able to download things into a system which has the ability to cause annoyance, destruction and disruption. There are some virus which will encrypt files and folders and there are some with capability to wipe out critical files related to the operation of a computer. A cyber criminal can use a virus to secretly spy on a system and thereby gaining access to sensitive data.
Virus hoaxes as the name suggests are false alerts of infection by a virus. A message appears to be real and causes a breach of security. These types of emails can stop mail servers and cause unexpected slowdown. This will ultimately lead to the exhaustion and wastage of precious time for the person.
Boot virus Description | F-Secure Labs. (2018). F-secure.com. Retrieved 27 April 2018, from https://www.f-secure.com/v-descs/boovirus.shtml
What Is A Computer Virus?. (2018). Us.norton.com. Retrieved 27 April 2018, from https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html