Free Essay

Round Worms

In:

Submitted By jtasker
Words 367
Pages 2
Science Daily Biologist discovers genes that repair the nerves after injury. In California scientists have discovered over 76 genes that play some role in regenerating nerves. To find the 76 genes, the researchers conducted experiments on more than 10,000 tiny laboratory roundworms. The first step involved developing genetic mutants of these transparent roundworms for each one of 654 genes that were suspected to play a role in the regulation of axon regrowth in worms, fruit flies and mice. They then labeled the roundworm neurons with green fluorescent protein and, with a precise surgical laser, damaged a specific axon. Because the worms were transparent they could see the axons expressing a green fluorescent protein. By examining the re-growth, or lack of growth, of the damaged axon 24 hours later, the scientists were then able to determine which of these 654 genes were actually important to axon re-growth. The 76 genes seen are believed to have the same function in humans as in the worms. Research teams are now collaborating with other investigators to conduct experiments on mice to verify this connection and determine which of these genes are the most critically important. This article is relevant to what I am studying because it show that we as humans have so many genes cells and other parts throughout our body that do many different things and when we damage these or harm them there is a way for our body to compensate or try to fix the problem. So in the worms they are finding axons or nerve cells that could potentially cure nerve damage in our bodies. My opinion is that if scientists can find a way to regenerate nerve cells in animals that maybe someday they will be able to find a way to fix individuals who suffer from nerve damage and maybe one day can resume the life they had before the injury. Scientists are coming up with so many new and exciting things that who knows maybe one day they will be able to find cures for injuries or diseases they have not been able to in the past. Who knows what the future might hold in the world of science.

Similar Documents

Free Essay

Pump Parts

...De Montfort University | ENGD1019 -Computer Aided Engineering – Assignment 3 | | P. J. Prickett 3/27/2014 | Solid models of all the components 1 1 The following dimensions have been put into place to ensure that the depth of the ridges are kept the same. Doing this will reduce all forms of likelihood of any abnormalities occuring when the driver worm is connect to the gear. 3 3 Here are the three stages of the creation of the driver worm. A sketch round the x axis of 360 degrees was drawn followed by a mirror bein created by the datum plane for the seep that was to be made. 2 2 The exact same steps were repeated in this stage, the only differences being a few dimensions and a change in the directions of the sweeps. To be more specific the difference in this case between the plane and the sweep was 6, this was to ensure that the heical sweepes were at an eaqual distance from each other in order for the two distances to stay equal when the overall size is changed. Doing this removes the likelhood of any mechanical issues. 5 5 4 4 3 3 2 2 1 1 Each of the 5 parts shown above are all derived from the centre of circles. Because they are each from the same centre circles they all then contain associativity from the same cross section of planes. 4 4 3 3 2 2 1 1 These are the creation and extrudes on the sides of the casing the bottom one is in a fixed position right at the bottom...

Words: 1097 - Pages: 5

Free Essay

Sec 280 Week 4

...information backed up somewhere you practically wont be able to retrieve your information. There are techniques that these attackers use to access information on your system. Potential security threats start with people; people who create these threats are to blame. These people are called hackers and predators. Hackers and predators create security threats and malware. They are computer programmers who use these security threats and malware to victimize other people by breaking into their systems to steal, change or destroy information. This is known as cyber-terrorism. Due to these hackers and predators computers are vulnerable at any time. These people create things like. Computer virus threats, Spyware threats, Phishing threats, Internet Worms, Rootkit, Zombies, Browser Hijacker, Email Virus, Mousetrapping, Spam, and Adware. Out of all the computers security threats out there the most well known is computer virus threats. The virus is a program that alters how a computer operates. The virus replicates and executes itself, this usually does damage to your computer. Spyware threats are an undercover cop in a way because it monitors your online activity or it can install software without your permission to gain personal information. It does all that without you even knowing. Phishing threat is when a hacker attempts to steal information through email or instant messaging. They send emails or instant messages that look real to people or businesses. The hackers attempt to steal...

Words: 734 - Pages: 3

Free Essay

Malicious Code

...includes virus, worms, Trojan programs, and logic bombs, the focus of this paper will concentrate on the comparison of viruses and worms. I will also examine the question as to weather of not non-Microsoft operating systems as less prone to virus threats. Malicious code threats are primarily programmed to create havoc or major problems within the computing and networking environment. Exploitation of internet based services and applications are probably the hardest hit because of the increase in everyday usage and the unfamiliarity of threat countermeasures of many users. Virus and other malicious are created only to create problems; nothing more. There are various levels that indicate the proficiency in developing or writing the program for viruses. These levels range from low skilled students to program researchers who have acquired many years of experience in developing their programming skills. The researchers are the group that introduces highly complex and sometimes anti-virus resistant code into computing/networking systems. Although they differ, most users do not distinguish virus and worms; the term virus is simply used by some as a catch-all for both threats. A virus is basically a self-replicating program that causes damage by attaching itself to files. Normally, A virus is spread to various computers through human actions, particularly files sharing and email. Worms are similar to virus in some respect but they are more sophisticated in nature. Worms are often referred...

Words: 490 - Pages: 2

Free Essay

Checkpoint Week 8

... The world of technology is threatened each day by malicious viruses and worms that can cripple an entire company. I will explain how each virus or worm functions and spreads through computer systems. Boot Sector - is a virus that is spread by floppy disk. The disk is left in the drive with the virus and will spread to the C: drive during the next boot sequence. File – is a virus that corrupts the computers executable files on a network. When the file is opened, the virus overwrites it and causes damage to the infected file. Multipartite – is a virus that uses the boot sector to move quickly, infecting both the boot sector and the executable files at the same time. This makes the virus very dangerous because just by turning on the computer, the virus latches onto the hard disk and broadcasts malicious payloads throughout the program files. Macro – is a virus that affects files that contain macro codes in them that is interpreted by an application. They are commonly spread by electronic emails. Trojan horse – is a program that seems to be functioning normally but has a hidden malicious virus in it, and by accessing the system or computer, can corrupt the authorizations. Email worms – is a worm or virus that is spread through email. They are usually sent as an attachment or spread inside the body of an email. Instant Messaging Worms – or IM Worm, is a self replication malicious code that is spread by using instant messaging networks...

Words: 420 - Pages: 2

Free Essay

Alienation

...life who has given me the strength, courage, and inspiration in completing this assessment. I would also like to thank my teacher who has helped me in every step of the way. I would also like to thank my friends and family, specifically my parents who has provided the necessary resources needed to complete this assessment and also in giving me the ongoing encouragement and assistance. Once again I say thank you. WATER BOURNE DISEASES HOOKWORM Hookworm is an intestinal parasite of humans. The larvae and adult worms live in the small intestine can cause intestinal disease. The two main species of hookworm infecting humans are Anclostoma duodenale and Necator americanus. Hookworm eggs are passed in the faeces of an infected person. If an infected person defecates outside (near bushes, in a garden, or field) or if the faeces from an infected person are used as fertilizer, eggs are deposited on soil. They can then mature and hatch, releasing larvae (immature worms). The larvae mature into a form that can penetrate the skin of humans. Hookworm infection is transmitted primarily by walking barefoot on contaminated soil. One kind of hookworm (Anclostoma duodenale) can also be transmitted through the ingestion of larvae. Itching and a localized rash are often...

Words: 2608 - Pages: 11

Free Essay

Advantage and Disadvanatge of Modern Tec

...Unemployment With the advancement of technology business processes have become more streamlined. This creates job redundancy , downsizing and out sourcing For example: In a factory, skilled technicians and machinists can be replaced by computer-controlled robots which can work faster, for longer and more consistently Before a company employed many typist and now can be replaced by a sigle person with a word processor Privacy Though information technology made communication quicker , easier and more convient it also brought along privacy issues. From cell phone signal interception to email hacking . Microchip dust – also known as smart dust can be virtually embedded in everything that we buy, wear, drive and read, allowing retailers and law enforcement to track consumer items — and, by extension, consumers — wherever they go, from a distance. Overriding Cultures While ICT may have made the world a global village, it has also contributed to one culture consuming another weaker one. For example, it is now argued that teenagers in the US influence how most young teenagers all over the world now act, dress, and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else. Reliance on Technology People technology to remember things and less use of their own memory, the poorer it becomes People don’t bother learning to spell because they use spell-checker, or need a calculator do perform minor...

Words: 319 - Pages: 2

Premium Essay

Unit 1 Assignment 1 Application of Risk Management Techniques

...In accordance with each of the threat/vulnerability pairs and their likelihood of occurrence, each of the possible risk will be listed below and how we will mitigate each: -Malware This can occur because of outdate virus protection and lack of employee knowledge. The best mitigation for this would be to update the current virus protection program and allow for constant updates through the firewall for updates for each program. -Equipment Failure This will occur when equipment isn’t maintained properly or just failure over time. This will lead to data loss due to not backing up data. The best way to mitigate this issue would be to back up data regularly and keep copies of all data to an off-site location. -Denial of Service Attacks This can occur when proper firewall and intrusion detection systems are not properly implemented. Mitigation for this would be to implement firewalls along with intrusion detection systems and monitor all traffic accordingly. -Users Users themselves that are not properly trained and kept on check can cause major damage to a company’s network. Lack of access control and giving out admin privileges to all users is dangerous. Mitigation for this issue can be implemented by add access controls and authentication parameters. In this brief report, I have included all of the possible threats and vulnerabilities and have proposed solutions for each. Upon researching and studying on probable causes of concern for you company’s assets, I have...

Words: 251 - Pages: 2

Premium Essay

On-Line Security: Attacks and Solutions

...EVREN KUCUKKAYA E-COMMERCE SEMINAR Elias A. Hadzilias, PhD NTUA Assignment: On-line security: attacks and solutions 2012 ISG – INTERNATIONAL MBA Table of Context 1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ....................................................................................................

Words: 5692 - Pages: 23

Free Essay

Broccoli

...about waist height and workers don’t have to bend over as much. A common pest on broccoli is Cabbage worms. These pests are the larvae of moths and butterflies. The word broccoli comes from the Latin word brachium and the Italian word braccio, which means “arm”. Broccoli is a high-quality vegetable for fresh use and is one of the more popular frozen vegetables. Broccoli is highly nutritious and has been deemed an anti-cancerous food by the American Cancer Society. This vegetable is a good source of Vitamin A, calcium, and Vitamin B2. Broccoli has to be grown on well drain soil pH should be 6.0 to 6.5. Omar Alejo ABT-92 Outline 4/6/2014 Broccoli How Is It Grown 1. Introduction a. Broccoli Is good for your health b. Broccoli is a part of the cabbage family. c. It has been shown to fight cancer cells in lab tests 2 Soil Quality a. Soils that are well-suited for the production of broccoli are fertile b. Well drained c. Have texture ranging from sandy loam to clay loam d. Soil pH should be 6.0 to 6.5 e. Organic soil does not require such a high pH 3. Irrigation a. Irrigate 1 to 1 1/2 inches of water per week b. Broccoli requires above average moisture c. When moisture is lacking it responds with slow growth and poor appearance. 4. Insect that attack Crop a. Several species of caterpillars attack broccoli b. Cabbage loopers c. Imported cabbage worm d. Diamondback moth, the cabbage...

Words: 473 - Pages: 2

Free Essay

Worms

...ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network. INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute throughout...

Words: 2891 - Pages: 12

Free Essay

It 240 Week 8

...Define each of the following terms in your own words: Boot sector File Multipartite Macro Trojan horse E-mail worms Instant messaging worms IRC worms File-sharing networks worms Internet worms * Explain how each virus or worm functions and spreads. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. A boot sector threat is a type of virus that infects host computers by writing the malicious code to the boot sector of the drive that’s infecting. This method of infiltration ensures that whenever the infected volume attempts to boot, the virus will boot first. File threats are virii that attach themselves to executable program files such as .exe files. After being run, the virus then effects other programs as they attempt to run, or infect the entire directory or volume in which they’ve been introduced. A multipartite threat is a threat with attributes of both boot sector and file viruses. These types of threats can spread from the MBR or boot sector to infect executable programs, or spread from a single file to infect the boot sector. A macro is a type of formula language used in complex tasks in software such as Microsoft word or excel. These threats are capable of assigning multiple key commands to one action . Macros infect systems through a document file type and infect he host once the file is accessed. A Trojan Horse threat is a threat that presents itself as a legitimate...

Words: 644 - Pages: 3

Premium Essay

It590 Journal 4

...Unit 4 Journal Jasmine Battle IT 590 – Kaplan University 11/27/2013 Unit 4 Journal In Unit 4, I learned how hacking have become a huge issue with technology in today’s society. I learn three ways to capture someone username and password. You can do that by eavesdropping, dumpster diving, and social engineering. People are also hacking into users’ networks. Sidejacking is a way where hijackers capture a user cookie. I learned in details more about malware. Malware consists of virus, worm, and spyware. Viruses are a code that has been added or embedded into another application. Worm is a self-contaminated program which can spread throughout the network. Spyware is a program that communicates over the internet without user’s consent. I learned the difference between phishing and spear-phishing. Phishing is when a large scale of information is capture from various computer users. Spear-phishing is when they go through email address to select a particular group of recipients to target. I learned that you can still make money even when you are a cyber-criminal. However, it is kind of a good choice to make to give to companies that are looking for a protection shield. I had already learned about online voting which could be a quicker way to save time on manual counting. In conclusion, I have learned a variety of information that could carry me forward with my education of learning something new every time. Knowing that you can become a hacker and not charge for a crime...

Words: 273 - Pages: 2

Free Essay

Mydoom Worm

...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...

Words: 809 - Pages: 4

Premium Essay

Project Part 1: Current Security Threats

...IS4560 Week 4 Project Part 1: Current Security Threats The three top security threats I have chosen for Aim Higher College are malware, exploit vulnerabilities, and social networking. Malware in another term that means malicious software. It is used to infiltrate and damage computers without the user’s permission. Some examples of malware are viruses, spyware, worms, Trojans, and rootkits. This is a top security threat because a computer can easily get infected. While students or staff members use the schools computers, they can download music or pictures, and a virus can be attached to those and the computer will get infected right away. Another security threat is exploit vulnerabilities. An exploit is an attack on a computer system, and this exploit will take advantage of vulnerabilities that exist on a system. This is why vulnerabilities need to be mitigated and taken care of right away. If not, attackers will always find a way to get on a system and steal data and personal information. This will affect students because there personal information but be out there to the public without their knowledge. The third threat that I believe is a main concern for this college is social networking. Nowadays everyone uses social networking such as Facebook, Twitter, and etc. The scams on Facebook include cross-site scripting, clickjacking, survey scams, and identity theft. Cross-site scripting is when the site tricks you to go to another webpage and this has hidden malware that...

Words: 326 - Pages: 2

Premium Essay

Chap 4

...1. Management is responsible for implementing information security to protect the ability of theorganization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data 2 Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. General management and IT management are responsible for implementing information security 4. The implementation of networking technology has created more risk for businesses that use information technology because networks are now connected to the internet and other networks external to the organization. This has made it easier for people to get access to business’s data 5. Information extortion occurs when an hacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. For example, if a Hacker r gains unauthorized access to a CEO’s computer and discovers unethical business transactions , he could then blackmail the CEO into giving him money in exchange for keeping...

Words: 1249 - Pages: 5