Question Description

Computer Architecture and Diagnostics

Assignment: Research Problem 5 (60 points)

Read the Research Problem #1 from Chapter 11 in your textbook on page 433

The Research Problem should include 2 pages

oThis does not include title pages or reference pages

oThis is at least 2 FULL written pages

1.Summary of the research problem

a.This should be thorough enough (but not plagiarized (meaning in your own words)) to give a reader a very good idea of:

i.What is malware in general and in particular a virus

ii.What is a buffer overflow

iii.How does a virus (or maybe other malware) exploit bugs in a software

iv.What is Data Execution Prevention (DEP)

2.Answer to the questions for the research problem which are based on the textbook readings or outside sources (these are not your opinion but you can include comments)

a.In discussing the summary of the case you may answer some of these questions already

3.Conclusion which is your thoughts on the research problem and its contents

In completing the research problem I want at least 3 in-text citations referencing the text book material or an outside source backing up your comments/answers

Present the paper in Microsoft Office Word document format. Name the file LastName_Reserach_Problem_5.doc and submit it to the Online Venue (Moodle) by the beginning of Tuesday class of Week 13.

All written assignments and responses should follow either MLA/APA rules

oTitle page (in MLA the title is usually on the first page but, the instructor can request a title page and this is what I am asking for so that there is at least 2.5 full pages of content)

oNo paragraph spacing

oDouble spaced/12pt font size/ Times New Roman

o1” margins (top, bottom, left and right)

oReferences and in-text citations follows either the APA or MLA rules

oCan follow link for the Purdue Owl site for information on MLA/APA:

Assignment Grading Criteria

Maximum Points

Research Description


All Discussion Questions answered thoroughly




Used textbook and/or outside sources to substantiate discussion


Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources, displayed accurate spelling, grammar, and punctuation.




Tutor Answer

School: Rice University



Computer Architecture and Diagnostics
Institution Affiliation




Computer Architecture and Diagnostics
Malware, also referred to as malicious software, is a file or a program that has harmful
effects to computers and networks. Malware is used to refer to a collection of worms, computer
viruses, spyware, and Trojan horse (Swain, 2009). These malicious programs have the potential
of performing different functions in the computer, which includes deleting, stealing, and
encrypting sensitive information. The malware can also alter or hijack the normal functioning of
computers while monitoring the activities of the users without authority.
On the other hand, a virus is a program that has been developed to infiltrate into
computers to alter or damage the existing data. This program has the ...

flag Report DMCA

awesome work thanks

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors