Pages

How to make cinematic intro in kinemaster- Tutorial In Kinemaster || Pixellab || Tutorial - Intro mate

KineMaster Tutorial: Neon Logo Reveal || Free Intro





Hello Friends, welcome back to another exciting tutorial, in this tutorial I show you how to make Neon Intro in KineMaster, watch carefully and hope you learn something new today.


How to make a cinematic intro in kinemaster- Tutorial In Kinemaster || Pixellab || Tutorial - Intro mate



Friends every video of this Intromate Channel make with Love so don't forget to leave a like and if you want to get more awesome Tutorial like this then Subscribe and tap the bell icon to get videos 1st from this channel.  #Intromate


DOWNLOAD IMAGE :   DOWNLOAD





We have explained it very easily. If you have any difficulty in understanding, then you can reduce the speed of the video by pressing the settings button of the video, as we have told in this image. To reduce the speed of the video. 

Now your video will be slow which will make you easier to make the video. If there is any problem So you must comment on us in the description, we will guide you step by step.


Intro for YouTube videos || KineMaster || PixelLab || TUTORIAL IN MOBILE

YouTube Intro Videos  TUTORIAL  KineMaster  PixelLab In Mobile


Hello friends, today we are going to learn how to make your own (intro) of YouTube. You can make videos for yourself or your friend or siblings from your mobile in a very easy way. In this short, we have tried to understand step by step. Once or twice you have to watch this video and just. 

We have explained it very easily. If you have any difficulty in understanding, then you can reduce the speed of the video by pressing the settings button of the video, as we have told in this image. To reduce the speed of the video. 


First, click on the settings of the video, 







Then click on the normal speed of the video at 0.75x or 0.5x. 


Now your video will be slow which will make you easier to make the video. If there is any problem So you must comment on us in the description, we will guide you step by step.


Hello dosto aaj hum seekhne jarahe ki hum apne youtube ke tital (Intro) Kaise banate hai ,
Bahot hi aasan tareeke se aap apne mobile se apne liye ya aapne kisi dost ya bhai bahen ke liye video bana sakte hai. 

Humne is tutorial me aapko step by step samjhane ki koshish ki hai.
Ek ya do bar aapko yeh video dekhna hai aur bas.
Humne bahot hi aasan tareeke se samjhya hai. 

Agar aapko samjhne me koi takleef horahi hai to aap video ke Setting button ko press karke video ki speed ko kam karke dekh liye.

jaisa ki is image me humne bataya hai.  
Video ki speed kam karne ke liye pahle video ki setting par click karein uske bad video ki normal speed ko 0.75x ya 0.5x par click karien Ab aapki video vido slow hojygi jis se aapko video banane me asani hogi.

Agar koi dikkat aati hai to aap humko description me comment zaroor karein hum aapko step by step guid kardenge . 




हेलो दोस्तों आज हम सीखने जारहे की हम अपने यूट्यूब के (इंट्रो) कैसे बनाते है बहोत ही आसान तरीके से आप अपने मोबाइल से अपने लिए या आपने किसी दोस्त या भाई बहन के लिए वीडियो बना सकते है. 

हमने इस कम में आपको स्टेप बी स्टेप समझने की कोशिश की है.एक या दो बार आपको यह वीडियो देखना है और बस.हमने बहोत ही आसान तरीके से समझया है. अगर आपको समझने में कोई तकलीफ होरही है तो आप वीडियो के सेटिंग बटन को प्रेस करके वीडियो की स्पीड को कम करके देख लिए.जैसा की इस इमेज में हमने बताया है. 

वीडियो की स्पीड कम करने के लिए पहले वीडियो की सेटिंग पर क्लिक करें उसके बाद वीडियो की नार्मल स्पीड को ०.७५क्स या ०.५क्स पर क्लिक करें अब आपकी वीडियो स्लो होजयगी जिस से आपको वीडियो बनाने में आसानी होगी.अगर कोई दिक्कत आती है तो आप हमको डिस्क्रिप्शन में कमेंट ज़रूर करें हम आपको स्टेप बी स्टेप गुइड करदेंगे. 

Click to All Backgrounds and Image Download  : DOWNLOAD

Kine Master Download Link: DOWNLOAD

Pixellab Application Download Link: DOWNLOAD 

Watch full Tutorial video 

What is Full form Of GPS - GPS Meaning

What is Full form Of GPS - GPS Meaning, full form of gps, gps full form, what is gps full form, gps ka full form, gps full form in hindi, gps full form in english
What is Full form Of GPS - GPS Meaning

GPS Full Form Name: GPS Meaning

Global Positioning System

GPS Full Form is the Global Positioning System. GPS is a navigation system that operates with the help of a satellite network. GPS was started by the US in the year 1973. The primary function of a GPS is to provide the time and location anywhere on earth as required, irrespective of the weather. Initially, it was created for military, commercial, and civil purposes.

Full-Form of GPS:

Today, GPS is used all over the world for driving directions and locations. Development in technology and the requirement of the current generations have led to more accurate results in the GPS system. Essentially, a GPS system is a group of satellite networks placed around the orbit of the earth and completely maintained by the US Defense Department.

GPS Full-Form – Additional Information

For the topic of our discussion, we have the famously used Global Positioning System, which is also known by its popularly used abbreviated form GPS. In this article, we shall discuss various facets of the Global Positioning System (which from hereinafter will be referred to as GPS). However, before we dwell deeper into those areas, we shall begin with the most rudimentary section of the discussion: a simple introduction to GPS.

Introduction to GPS technology

The Global Positioning System refers to the space-based system that is used for navigational purposes. The system is used for generating information related to time and location in all kinds of climatic conditions. The system can be used from any part of the earth and in fact from near the Earth. However, the requirement for such use is that there should be an unhindered line of sight to at least 4 or more GPS satellites.

Moreover, the GPS system plays a key role in various functions pertaining to military, intelligence, civil users, and commercial customers from across different parts of the world. The GPS was created by the government of the USA, which not only maintains the system but also makes it available free for use to anyone who has a GPS receiver.

The system was the outcome for the need to remove the shortcomings that were there with previous versions of the navigational system. There were extensive studies conducted on a number of conventional engineering designs during the period around the 1960s.

After rigorous experimentation, the United States Department of Defense (abbreviated as DoD) came up with the system, which in the beginning used only 24 satellites. The entire system became operational in the year 1995. Key persons who are credited to have developed the system are Roger L. Easton, Bradford Parkinson, and Ivan A. Getting.

With time, new technological modifications have been incorporated into the system. Efforts are now being made to successfully develop the GPS Block IIIA, which is the next-generation GPS system, and Next Generation Operational Control System (abbreviated as OCX).

Apart from the GPS systems, many other countries have come up with their own positioning systems. Russia came up with the Global Navigation Satellite System (abbreviated GLONASS) pretty much at the time when GPS came into existence, however, this system could not realize its full potential until the 2000s. India too is making more technological modifications to its Indian Regional Navigation Satellite System (abbreviated as IRNSS).

Then there are the Chinese BeiDou Navigation Satellite System and the Japanese Quasi-Zenith Satellite System. Now that we have discussed the introductory aspects of the GPS, we shall now move deeper into other facets of the system. So here are certain things you should know about the GPS:


What is Full form Of GPS, full form of gps, full form for gps, the full form of gps, full form of gpsc, what is the full form of gps, what is full form of gps
What is Full form Of GPS

The history behind the development of the GPS

Some light has already been thrown on the history behind the need to have a navigational system. This segment will highlight more facts about the same. The design of the subject matter, (i.e) GPS is partly based on radio-navigation systems like the Decca Navigator and Long Range Navigation (abbreviated as LORAN).

These two navigation systems mentioned were developed in the 1940s and they were in use in the British Royal Navy during World War II. In the year 1956, Friedwardt Winterberg, a physicist gave a proposition on General relativity, which basically talked about the detection of time slowing down in a powerful gravitational field with the help of accurate atomic clocks which are placed in orbit of artificial satellites.

Preceding the development of GPS, there were many attempts made on the development of a positioning system. With these developments in the period around the 1960s, it became palpable that an advanced system was needed and such a system could be developed by utilizing the technologies derived from Transit, SECOR, Timation, and 621B.

It was in the year 1973 that the real synthesis of the GPS system was discussed in a meeting organized during Labor Day. The meeting comprised military officers at Pentagon, which discussed the possibilities of having a Defense Navigation Satellite System (abbreviated as DNSS).

In the same year, the DNSS program was given the name Navstar, which stands for Navigation System Using Timing and Ranging. It was not made for civilian use then. It was only in the aftermath of the shooting down of the Korean Air Lines Flight 007 and Boeing 747 that the then President of the USA, Ronald Reagan declared that GPS will be available soon for civilian use the moment it is developed sufficiently.

Then, with a series of developments, a full-fledged GPS system came into existence. Public use of GPS has made it incumbent upon the United States DoD to ensure that the GPS system is not used in a hostile manner and also that the GPS is made available in a continuous and worldwide fashion for civilians.

Awards and Recognition

The development of GPS was a major achievement in the history of technological innovations. Because of this, the GPS team has won many accolades for it. In the year 1993, the GPS Team was selected by the National Aeronautic Association for the prestigious award Robert J. Collier Trophy. 

The GPS team involved researchers and developers from the Aerospace Corporation, the USAF, IBM federal Systems company, Rockwell International Corporation, and the Naval Research Laboratory.
Two of the GPS developers were recipients of the National Academy of Engineering Charles Stark Draper Prize for the year 2003. 

Those two developers who received this award were Ivan getting, who was an emeritus president of prodigious aerospace major Aerospace Corporation, and Bradford Parkinson, who was a professor at the world-famous Stanford University.

The GPS has been inducted into the Space Foundation Space Technology Hall of Fame in the year 1998. In the year 2011, the GPS technology was honored with the 60th Anniversary Award of the International Astronautical Federation (abbreviated as IAF). The GPS technology was recognized for its role in the development of the navigational system across the globe and how much it has helped in engaging international research for the benefit of humankind.

Fundamentals behind the working of the GPS technology

One can, of course, dig deeper into the intricate fundamentals of the GPS technology but we shall not do so because it would be too technical an issue. Under this segment, we shall discuss the basic fundamentals behind the functioning of GPS technology.

The working of GPS technology is based on the known location of specialized satellites and time. These specialized satellites carry with their systems extremely stable atomic clocks that synchronize with each other and with ground clocks. The satellites detect locations quite precisely.

The GPS satellites transmit their time and location quite precisely to the ground clocks. At a given time, four satellites at least must be viewable by the GPS receiver so as to allow the computation of coordinates and clock deviation from the satellite time.

Applications of the GPS system

As mentioned before in the introductory paragraph, GPS technology finds its application in military, intelligence, and civilian and commercial purposes. For civilian purposes, the technology is useful in Astronomy, Clock Synchronization, Fleet tracking, geotagging, Robotics, Sports, 

Telematics GPS aircraft tracking, Radio occultation, Emergency services, Disaster management, and Geofencing, etc. In military uses, the GPS system is applicable in cases such as Nuclear Detonation Detection System, Target tracking, Navigational services, Artillery projectiles, etc.

GPS Full Form: Generac Power Systems

Full-Form of GPS stands for Generac Power Systems. Generac Power system is a company founded in the year 1959. It is one of the independent and leading manufacturers of generator systems for communication, residential, industrial, recreational vehicle, and commercial applications. Generac delivers high-quality products with competitive and consistent pricing and fast delivery times.

The GPS helps in providing advanced manufacturing solutions, engineering, and product designs. The product line of this private company includes portable generators and modular power systems. This company also specialized in the manufacture and design of transfer switches, enclosures, air-cooled engines, control systems, and alternators. 

Additionally, it also provides options for online product registration. There are about one thousand to five thousand employees in this company.
The production of Generac Power systems is distributed in the Asia Pacific, the Middle East, Latin America, Africa, and Europe through a vast network of equipment rental companies, retailers, and wholesalers. In the year 2012, the GPS acquired Ottomotors. Ottomotors was an international distributor and producer of diesel gaskets. 

The inventory warehouses and distribution facilities of GPS are in Brazil, Mexico, and Italy and in the United States. In the year 2014, it was awarded as the Company of the Year for contributing to the industry of natural gas generators in North America.

Full-Form of GPS: Goodpasture Syndrome

GPS Full-Form stands for Goodpasture Syndrome. Goodpasture syndrome is basically an autoimmune disorder. People suffering from this disease develop substances that attack a kind of protein known as collagen present in glomeruli of the kidneys and air sacs in the lungs. Breathing in an environment having hydrocarbon solvents or a respiratory infection can trigger this disorder. In these cases, the immune system attacks tissues or organs, since it mistakes them for foreign chemicals or viruses.

Men are more likely to suffer from Goodpasture syndrome as compared to women. It usually attacks in early adulthood. The occurrence of symptoms is slow. It may take months or years. More often, they develop fast over days or weeks. Early symptoms include weakness, fatigue, and loss of appetite. Lung symptoms consist of shortness of breath, dry cough, and coughing of blood. Other symptoms may include swelling in legs, vomiting, nausea, and pale skin.

For determining the disorder, tests that are done include Kidney biopsy, Creatinine, BUN, Lung biopsy, and Chest x-ray. Early diagnosis is essential. If the disorder is overlooked, then the kidneys can get damaged severely. 

Possible complications include bleeding lungs, lung failure, chronic kidney disease, and glomerulonephritis. If a person is having less urine, or if he or she is suffering from one or more symptoms of the Goodpasture syndrome, a medical professional must be contacted immediately.

GPS Full Form: Global Public Square

Full-Form of GPS stands for Global Public Square. Global Public Square is a one hour program that provides a detailed look not only at the decisions that affect the lives of people but also at foreign affairs. This program is hosted by Fareed Zakaria. Every week, this program provides the viewers with an in-depth interview with world leaders, analysts, and Newsmakers, thereby helping in breaking down the toughest problems of the world.

Global Public Square has been hosted by Fareed Zakaria since the year 2008. This program airs worldwide every Sunday on the channel CNN. Up till now, Dr. Zakaria had interviewed many important personalities like Lula DA Silva, Kind Abdullah II, Barack Obama, Moammar Gadhafi, Narendra Modi, and many other journalists, business leaders, politicians, and intellectuals.

Global Public Square was nominated for an Emmy award for the interview with Wen Jiabao. In the year 2011, the same show won a Peabody Award since he covers global issues in a way that helps in showing their importance for the viewers throughout the globe. Through this program, he gives viewers the nuanced and rich perspectives. 

This can be evidenced by many examples of the show, for example, through the Mahmud Ahmadinejad’s interview, Dr. Zakaria provided an in-depth look at the relations of Iran with the other countries, and the cultural and political life within this country.

Full-Form of GPS: Government Policy Statement

GPS Full-Form refers to Government Policy Statement. A statement which outlines the plans and policy intended by the government is known as the Government Policy Statement. In the case of countries that are democratic or republic, a parliament minister or the government head announces the government policy statements. In a crowned republic, or in other words, in a parliamentary monarchy, the Throne Speech presents the same.

This can further be explained by taking the examples of Austria and Germany. In Germany, the Bundestag is a legislative and constitutional body at the federal level. In Austria, the same type of body is represented by Nationalrat. In both countries, the government policy statement is submitted by their Chancellors, who is the head of their respective federal governments.

It is an important commitment of the constitutional nature for both the government and the parliament, even if it is not bonded legally. The policy statement can be given to the parliament by the government during the period of legislation through the ministers and the Chancellors. Another example is that of the country Sweden. Here, the Prime Minister gives the government policy statement at the start of every parliamentary year as well as at the beginning of the legislative session of the government.

GPS Full Form: Global Payment System

Full-Form of GPS refers to Global Payment System. GPS is a provider of processing services for the electronic transaction for multinational cooperation, government agencies, and ISOs or Independent sales organization that are located throughout the Asia-Pacific regions, Europe, the United States, and Canada. It helps in providing processing solutions for terminal management, electronic check conversion, purchasing cards, electronic check services, electronic check guarantee, gift cards, debit cards, and credit cards.

The parent company of GPS is the National Data Corporation. It was founded in the year 1967. Presently, the company provides services to both ‘brick-and-mortars’ as well as virtual merchants. GPS is a publicly traded and independent company on the NYSE since the year 2001. The offices of GPS are located in Russia, Europe, Canada, the Asia-Pacific, Spain, the United Kingdom, and the United States to serve institutions that utilize its internet, processing and acquiring services.

It processes nearly six billion transactions every year presently and serves nearly one million merchant locations through their network of electronic information. The headquarters of GPS are in Atlanta, located in Georgia. 

The current CEO of GPS is Jeffrey S. Sloan. The service and product lines consist of acquiring Internet-based solutions for storefront support and payment processing, merchant processing support, point-of-sale applications, and front-end network.

Full-Form of GPS: Gladstone Power Station

GPS Full-Form refers to Gladstone Power Station. Gladstone Power Station is the largest power station in Queensland. It is situated at Gladstone, on the coast of Central Queensland. The Gladstone power station was built as well as commissioned by the SEC or State Electricity Commission in the year 1976. In the year 1994, the joint venture of Gladstone Power Station bought the power station for supporting the expansion of Boyne Smelter.

This power station helped the industries in the region of Gladstone to become viable. NRG Gladstone operative services help in operating Gladstone Power Station. It contributes the capacity of nearly sixteen hundred and eighty megawatts to the power grid of Queensland, that is, it accounts for nearly thirteen percent of the capacity of electricity generation in Queensland.

The main fuel used in this power station is coal. It receives its supply of fuel from Anglo Callide and Xstrata Rolleston coal mines. It employs nearly three hundred and forty people in the Gladstone region. Not only it provides economic advantages to the region, it also maintains cordial relations in the local community and is represented as a major player in the industry. NRG also provides a community assistance program that focuses primarily on youth support, needs of disadvantaged groups, environmental programs, public safety, and education.

GPS Full Form: Guelph Police Service

Full-Form of GPS stands for Guelph Police Service. The Guelph Police Force or GPS is the police force that operates in Guelph city, located in Ontario. It employs nearly ninety-six civilian members and one hundred and ninety police officers. It serves a population of approximately one hundred thousand.

The GPS board consists of five members. They are responsible for providing effective and adequate police services in the city of Guelph. The main responsibility includes the everyday police service operation, along with regular meetings with the board for discussing priority and options for optimum delivery of police services to Guelph.

There are many branches of GPS, which includes CIRT or Critical Incident Response Team. It has twenty-one members. Additionally, its branches also include Downtown Liaison, Traffic, Civil Emergencies, Crime Analyst, Forensic Identification, Community Relations, Strike Liaison, and Bike Patrol. Multiple services are provided by the GPS. Some examples of these are court services and MIFIPPA.

The vehicles used by the GPS include Ford Taurus and the command vehicle. Ford Taurus cars are quite large, thereby provides enough room for driver/passenger, cage, prisoner, and police equipment. These cars are specially equipped for tasks like neighborhoods; Traffic, Canine, and Tactical teams. The command vehicle was purchased in the year 2015.

It is shared between the fire department and the police service of Guelph. It is equipped with communication gears and computers for use by police and fire teams along with public and medical work personnel. It is also equipped with interview rooms, furnaces, a bathroom, and air conditioning for emergencies and incidents.

Full-Form of GPS: Ghostfinder Paranormal Society

GPS Full-Form stands for Ghostfinder Paranormal Society. The Ghostfinder Paranormal Society is basically a paranormal investigative team. Its foundation was laid by Barri Ghai in the year 2006. It has now become the most ‘polished’ organization of ghost hunters in the United Kingdom. They have appeared on radio and television worldwide. They regularly offer expert advice or testimony on media cases that appear frequently in the national papers.

The team of this organization operates throughout the United Kingdom. The team members of the GPS or Ghostfinder Paranormal Society are located in many countries like London, Kent, Plymouth, Surrey, Buckinghamshire, Oxfordshire, and Hertfordshire. The people making the GPS team are diverse and come from all kinds of backgrounds and ages. The members include retail and catering managers, engineers, ex-police, military, and even hairdressers.

All the gadgets used for investigation by the team of the Ghostfinder Paranormal Society are the latest. These tools help them in locating as well as recording paranormal activity. Examples of these tools are laser thermometers, Full spectrum cameras, EMF detectors, digital video recorders, thermal imagers, and Digital Voice Recorders.

These devices help the investigators in gathering valuable data that aids in proving or disproving the existence of paranormal phenomena like ghost haunting. It is basically a nonprofit organization and does not charge for its services. They get paid by the media work they do which helps in funding their website and the expensive kit and all gadgets of ghost hunting.

GPS - Frequently Asked Questions

  • What is the full form GPS?
  • What is the full form of GPS and how it works?
  • What is GPS and its uses?
  • What is the full form of GPRS and GPS?
  • What is the full form of USB?
  • What is GPS in English?
  • What is the main function of GPS?
  • How is GPS used today?
  • What are the types of GPS?

For Further Reading In Wikipedia: Click Here

For More Full Forms in A to Z Category: Click Here

SIM Full Form Name | Full Form of SIM

SIM Full Form Name: Full Form of SIM, long form of sim card, full form of gsm sim, full form of sim, full form of the sim, full form for sim, the full form of sim, full form of sim card, what is the full form of sim, what is full form of sim, full form of sim in hindi, full form of simi, full form of simm, full form of sima, what is full form of sim card, full form of sim in computer, full form of gsm sim, full form of mobile sim, full form of sim in mobile,, full form of jio sim, long form of sim card, full form of sim card in english, full form of lte sim, full form of sim card in hindi, full form of airtel sim, what is the full form of jio sim
SIM Full Form Name: Full Form of SIM

What is the full form of sim?

Long Form of Sim Card 

Subscriber Identity Module

SIM Full Form is a Subscriber Identity Module. SIM is basically a smart card found inside cell phones. SIM carries a unique number specific to the owner and stores data and prevents its usage when removed from the phone. Nevertheless, unlike the CDMA or Code Division Multiple Access phones, only Global System for Mobile or GSM type of phones use SIM cards.

The SIM card comprises a chip that is inserted into the phone to initiate usage by tapping into a particular network. The most important feature of the SIM card, which makes it work, is the authentication key.  

The authentication key of a SIM card is given by the service provider. This has to be activated whenever a new SIM card is used. It is a huge blessing that allows individuals to change phones without changing the SIM card.


SIM Full Form Name: Full Form of SIM, sim card ka full form, sim full form in computer, usim full form, sim card full meaning, sim er full meaning sim card ki full form, sim card full form in hindi, sim card full form in english, what is full form of sim, what is the full form of sim, what is full form of sim card, what is the full form of sim card, what is the full form of jio sim, what is a full form of sim, what is the full form of sim in mobile phone, what is the long form of sim, what is full form of jio sim, what is the full form of simi, what is the meaning of full form of sim
SIM Full Form Name: Full Form of SIM

SIM Full Form – Additional Information

We all know that when we buy a mobile phone then to activate it we need a SIM card. Very few are actually aware of what the full form of SIM is or its importance.  It is a smart card or an integrated circuit card (chip) that is used in GSM phones (Global System of Mobile communication) and besides encrypting data (SMS) and voice transmission, it stores user identity data that authenticates and identifies the subscriber on the telephone network circuit.

  • SIM card, as it is popularly known, can store user settings pertaining to the storage of phone numbers, data messages, etc. It is identified by a unique code that is engraved on the chip known as ICCID or Integrated Circuit Card Identifier as well as IMSI or International Mobile Subscriber Identity. SIM is engraved on removal and portable smart card that we know as the SIM card. This has the portability of being used in different mobiles and yet retaining its unique identity.

  • The first-ever SIM card was developed in Munich in 1991 by Giesecke & Devrient and the initial 300 cards were sold to a Finnish wireless network operator. Besides the ICCID and IMSI codes, the SIM has temporary data about the local network and the services that the user has permission to access. It also has a provision of storing two passwords – a PIN or personal identification number for regular use and PUK or personal unblocking code for unlocking the PIN.

What is the importance of SIM

  • The SIM cards are available in two variants – mini-SIM cards and micro-SIM cards. The first type is used in normal GSM mobiles and the micro-SIM card is inserted to activate a smartphone. A SIM card can be changed from one handset to another and yet the data stored on it like your contacts, their numbers and data messages, etc remain intact. This is the major advantage of a SIM card because it gives them the security of communication.
  • In case the mobile handset gets damaged or the battery runs low, then by just replacing the card from damaged mobile to another puts you back on track of mobile communication. In the current world, there are too many crimes and cases of terrorism. 
  • The threats are usually carried out using a mobile phone since you can make the call and destroy the card. However, since each number is associated with a particular SIM card, it is easy to trace the owner of the number and thus reach the culprit.
  • When a person applies to obtain a SIM card, that person’s residential proof and photo identity are collected for verification. Only after satisfactory verification of the user, the network provider opens the service for that number. 
  • This ensures that there is no misuse of the SIM. However, the clever criminal minds find loopholes in the system and collect many SIM cards for nefarious use. Nonetheless, since SIM is unique in its character, there is nothing much that can be done in terms of cheating and finally, the card gets detected on the network.

Various features of the SIM card

  1. This is a modern age when everything can be obtained in multiple numbers. Similarly, as far as SIM card usage is concerned per person, there is no need to have just one. Presently, many GSM, as well as smartphones, have a facility of inserting two SIM cards and are known as “dual-SIM phones”. This is particularly practical for businessmen etc who can then take the privilege of keeping the two identities separate. 
  2. One SIM card can be used to store personal numbers and messages; whereas the other card can be exclusive for business purposes. This gives a scope for privacy and organization of contacts as per personal and business grouping.
  3. These dual SIM cards can be operated in two ways. In some phones, the cards need to be switched to use and the other type of phones especially smartphones have the facility to keep both the SIMs active at the same time. Even though currently the mini and micro SIM cards are widely used, there is a third type that is the size of a credit card. But it is not in use anymore. 
  4. The micro-SIM was designed with compatibility in mind. The same phone should have the facility of mini as well as micro card and thus the contact area of reading the card data is kept the same. In some cases, instead of buying a separate micro SIM, people cut their mini cards with a Knife or scissors to the micro size.

SIM and network providers

The SIM card opened a whole avenue of business for different network service providers. The providers need not possess or run a cellular telecom network. It is a leased capacity from the actual network owner and these are just mobile virtual network operators (MVNO) who provide a SIM with their network to the customer.

In today’s age, there is a competition between service providers and though initially, it was not possible, now it is possible to change your service provider with the same telephone number that has been assigned to you. This is called “number portability”. So in case you are not satisfied with the transmission, connectivity, or services of your network service provider, you can opt for a better carrier.

Even though in India it is not prevalent as far as the use of GSM phones are concerned, but in some countries like USA, UK, Canada, Australia, etc there is a system of the mobile phone being locked to a particular service provider and the SIM card is not accepted of any other carrier. However, some providers do give the option of unlocking the phone and then the customer has the liberty to use whichever SIM card he likes.

How a SIM works

  • A unique code IMSI (International Mobile Subscriber Identity) identifies the SIM card on the carrier’s networks. Each SIM card is tied to its location and if the phone is carried to a different state, then it goes on a roaming network, where the base service provider has tie-up with other networks with good transmission signals in the area. Since these are external leased lines, the charges for calls made on the roaming network are always more. Each SIM has a personalized authentication key known as K¡ provided by the operator. The same key is also stored in the database of the operator’s network. This database is known as the Authentication Center or AUC.


  • When the mobile handset is started, it gets the IMSI from the SIM card. This is then passed on to the carrier to request the right of entry and authentication on the network. Then through a series of processes, the operator matches the K¡ with the database number and if the two numbers match, the customer is granted access to the operator’s network. Talking on a mobile phone may seem like an easy task. Nonetheless, the whole process of getting a connection for communication through a small chip called the SIM card is surely a complicated mission.

Full-Form of GSM Sim: Singapore Institute of Management

  • Full-Form of SIM refers to the Singapore Institute of Management. Also known by its abbreviated form SIM, It is the largest institute in Singapore in respect of private education and professional training. The institute, or let us just simply refer to it as SIM, was established in the year 1964 by the Singapore Economic Development Board.
  • Also known as EDB, the Singapore Economic Development Board is a statutory body that creates a framework to ensure the development of business and investment avenues in the country. The SIM is located in Clementi, Singapore. Under the aegis of the SIM, Singapore’s first privately funded institute the SIM university was established in the year 2005.
  • The Ministry of Education has approved a number of degree courses that the SIM University provides. Because of the extensive course structure and national status, the university is popular and has an enrollment of about 10.000 students admitted in different disciplines. In the year 2008, the SIM had initiated the process to make UniSIM programs more accessible to adult learners. Permanent residents who enroll in the UniSIM’s programs are eligible for a government subsidy of 20% of tuition fees and eligible Singaporeans get 40% subsidy.


  • The SIM offers degree courses in a variety of disciplines and conducts about 50 educational programs in different countries like the United States, the United Kingdom, Europe, and Australia. Apart from full-time courses, the SIM also offers part-time courses and diplomas. The SIM offers undergraduate degrees like Bachelor of Communication, Bachelor of Arts Economics, Bachelor of Science in Marketing, and the Bachelor of Science in Economics.


  • As far as master courses are concerned, the university offers such degrees on Science in Digital Marketing, Science in Engineering Business, etc. Most of these degrees are awarded by foreign universities like the Bachelor of Communication is awarded by RMIT University, the Bachelor of Arts Economics is awarded by the University of Buffalo, the Master of Science in Digital Marketing is awarded by the University of Southampton, etc.


  • The SIM has four campuses and this fact makes it Singapore’s most extensive privately funded institute. The SIM headquarters is the center for all student activities and events. There is a SIM Management House that undertakes membership and workshop activities. The administrative functions are conducted in the SIM Clementi Centre. The SIM provides SIM Global Education @Ulu Pandan, which is one of the largest facilities that provide boarding facilities, seminar hall, etc.

Full-Form of SIM: Security Information Management

  • SIM Full Form stands for Security Information Management. SIM refers to a terminology often used in the Information Security field. The term is used to allude to a collection of data, which includes log files. The collected data is moved into a central repository that undertakes a thorough trend analysis. Thus, it does what the name sounds: it manages the data collected and performs security analysis.
  • Products with Security Information Management, or let us just refer to it as SIM, behave like software agents that operate on computer systems, which need to be analyzed. These agents then transfer the log information to a server that functions as a centralized system or “security console”. 
  • This “security console” is an important system, to begin with: it generally displays reports, charts, graphs, etc of the information it has received. In fact, there are some software agents that make use of local filters with the purpose of lowering down and manipulation of data that they eventually transfer to the “security console”. The “security console” is handled by a human being, who is tasked with the duty of reviewing the information by undertaking analysis and report alerts, if any.
  • A security console is necessary because it performs the primary task of correlation and analysis and the information sent to the console is normalized by the software agents into a commonly used form, which is generally XML (Extensible Markup Language). Often the use of terminology SIM is mistaken to mean a reference to the feature of protection of one’s infrastructure from any potential security breach. It is to be understood that SIM refers to a mechanism that unearths the irregular behavior of the computer system with the help of techniques pertaining to data collection.
  • Thus, it would be wrong to understand the functioning of the SIM to be similar to that of Information Security Management (InfoSec), which is a terminology used in reference to the complete security mechanism that protects the computer environment. Apart from being referred to as SIM, Security Information Management is often referred to as log management, which is totally different from Security Event Management (SEM). SIM is, however, a part of Security Information and Event Management (SIEM).

SIM Full Form: Society for Information Management

Full-Form of SIM refers to the Society for Information Management. SIM is one of the most prominent and preferred professional organization in the world, with 4,500 senior information technology (IT) executives, Chief Information Officers, academicians, and other IT think tanks. The organization endeavors to help in enhancing intellectual capital by bringing together IT intellectuals.
Let us explore some historical facts concerning the inception and developments surrounding the SIM. At the Association for Computing Machinery (ACM) conference held in Las Vegas in August 1968, the establishment of SIM was conceptualized.

This happened when a conversation was initiated between Robert Head with the Software Resource Group and Herb Schwartz with the United States Atomic Energy Commission. They discussed how inappropriate and insufficient emphasis on the management aspects of computing. This discussion went on to become the foundational principle of the SIM that came into being in the year 1982. Many stages of discussions and decision-making led to SIM.

A committee was instituted in the year 1968 that held its first meeting at the United States Atomic Energy Commission in the same year. Joseph P. Cunningham, Richard E. Dooley, Dr. James C. Emory, Robert B. Forest, W. Robert Widener, Robert K. Wilmouth, Robert V. Head, Dr. Alan J. Rowe, James G. Rude, M.H. Schwartz, and Robert G. Stevens were the founders of the society.

The meeting was followed by a conference “Bridging the Gap between the Management Function and Information Technology” held at the University of Minnesota in the year 1969. The conference was attended by more than 250 persons. The SIM has founded many programs for the purpose of furthering its founding goals and objectives. Some of those programs are as follows:


  • Advanced Practices Council: Also known by its abbreviated form APC, it is a platform of discussion where experienced IT executives come together and decide to discuss on various research-related aspects of IT. The council was established by Warren McFarten in the year 1991. Mr. Warren McFarten comes from the Harvard Business School.
  • Future Potential Program in IT: It is yet another endeavor of the SIM to provide progressive insights into the IT sectors and managerial aspects of the same. It was created with the purpose of promoting IT as a progressive career option among college students. This program was created in partnership with Microsoft, which later stopped funding the program since the year 2007.
  • Leadership Development Roundtable: LDR is modeled on the popular Regional Leadership Forum (RLF) and it addresses issues pertaining to leadership and development of personality.
  • SIMposium: It is a conference that invites discussion upon issues relating to IT sectors, controversies, new developments, amendments, etc. Till 2002, the conference was called SIM Interchange Annual Conference.

Full-Form of SIM: Space Interferometry Mission

  • SIM Full Form stands for Space Interferometry Mission. Also known as the SIM or SIM Lite or SIM Planet Quest, refers to a space telescope that was created by the United States National Aeronautics and Space Administration (NASA) in partnership with the contractor Northrop Grumman. The telescope was created with the purpose of finding small-sized planets that revolve in the possibly habitable areas of stars other than the Sun. 
  • The telescope could not come into official use as it was canceled in the year 2010. Before its cancellation, the telescope was intended to be launched in the year 2005, incorporated in the Evolved Expendable Launch Vehicle (EELV) but due to insufficient budget, the launch date was postponed many times.
  • The Purpose of the telescope was not limited to the search of small-sized planets in the habitable areas near stars but it could have helped in the mapping of the mysterious Milky Way Galaxy. It could have performed other tasks like a collection of data from stellar masses of stars, determination of the spatial aspects of dark matter in galaxies, and in gravitational microlensing effect that helps in calculating the mass of the stars. To achieve all these goals, the SIM would have used optical interferometry. Optical Interferometry is a scientific technique that gathers light with the use of many mirrors combined in an interference pattern.
  • The technology used in the SIM is advanced, as it can lead to the development of powerful telescopes capable of capturing images extrasolar planets. This technology can be used to ascertain whether those extrasolar planets have the capacity to sustain life forms. 
  • The SIM used another advanced technology and that was termed as “rulers”. Rulers have the ability to calculate in increments precisely. These rulers were designed to work as networks and they had shock absorbers in them to reduce vibrations during measurements.

SIM Full Form: Serving In Mission

Full-Form of SIM stands for Serving In Mission. It is a non-profit Christian mission organization. SIM is an international, interdenominational organization that was established in the year 1893. The founders of the SIM were Walter Gowans and Rowland Bingham, both from Canada, and Thomas Kent from the USA. Originally, the SIM was known by the name Soudan Interior Mission, with Soudan being a reference to Sudan of West Africa.

The organization, for many years, underwent changes & few mergers, and eventually, it settled for the abbreviated form “SIM”. In French-speaking nations, the organization is often referred to as Société Internationale Missionnaire. 

The headquarter of the SIM is located in Fort Mill, South Carolina, with many sending officers located in different parts of the world like France, South Africa, South Korea, Belgium, Singapore, Italy, New Zealand, the United States, Switzerland, and Australia.

The organization is an amalgamation of many distinct organizations, whose own histories date back hundred years ago.

Those organizations include Africa Evangelical Fellowship, International Christian Fellowship, Andes Evangelical Mission, and Sudan Interior Mission. Thus, the SIM is one of the most prominent and recognized Christian missionary organizations.

Let us explore some historical facts behind the establishment of the SIM. It all started in Sudan. The founders, Water Gowans, Rowland Bingham, and Thomas Kent, wanted to evangelize the Sudanese region. 

The first base of the mission was founded in the year 1902 and eventually its reach expanded to other regions of the country and then of the world. By the year 1998, the SIM had covered areas like Guinea, Niger, Nigeria, Senegal, Kenya, Liberia, Malawi, South Africa, Sudan, and Togo, etc.

In 1989, the SIM had merged with International Christian Fellowship, and with this merger, the SIM extended its reach to south Asian regions like Bangladesh, China, Nepal, India, Philippines, Mongolia, Pakistan, etc. In the year 1998, the SIM merged with Africa Evangelical Fellowship (AEF).

The purpose of the mission is to evangelize and attend to the needs of people; educate Christians to respect the values of Church, and to train churches and other Christian missions. As far as records of the year 2008 are concerned, the SIM has about 1800 missionaries actively engaged in about 37 countries, primarily in the regions belonging to South America, Africa, and Asia.

Full-Form of SIM: School for Improvisational Music

SIM Full Form refers to the School for Improvisational Music. SIM is a part of the Center for Improvisational Music (CIM) established with the purpose of educating students in creative music. The SIM sincerely engages in training aspiring students about music and since 2001, it has conducted about 20 interactive workshops, which have been attended by more than 800 students. 

The sessions conducted by the SIM include masterclasses, coaching, private tutoring, etc. The SIM brings together some of the most talented and renowned improvisers from the fields relating to contemporary music and jazz. The SIM provides sufficient opportunities for aspiring students to learn about creating music.


For Further Reading In Wikipedia: Click Here

For More Full Forms in A to Z Category: Click Here 

What is The Full Form of VIRUS

What is The Full Form of VIRUS, full form of virus, full form of virus in computer, computer virus full form, what is full form of virus, full form of virus in biology, full form of anti virus, full form of virus in science, the full form of virus, full form of virus in computer language
What is The Full Form of VIRUS

Full-Form of VIRUS

VIRUS Full Form Name :

Vital Information Resources Under Siege

VIRUS Full Form is Vital Information Resources Under Siege. VIRUS is a software designed to duplicate itself and this is done by replicating itself into various programs that are stored in the computer.

Most often it creates a negative effect like corrupting the programs and functionalities of them as well as the data stored in the memory of the computer.

Man creates every VIRUS that affects a computer. It is quite easy to create a simple virus that duplicates itself multiple times. Though it appears simple it can cause high damages to the system. 

On the other hand, complicated VIRUS programs have the capability to transmit across various networks and bypass security systems.
It was in 1987 when one of these VIRUSES damaged ARPANET (which was a huge network utilized by several universities and defense departments) that several anti-virus programs started appearing in the market. 

Currently, most systems are equipped with adequate anti-virus tools to conduct periodic checks of the computer to the commonly known virus programs.


What is The Full Form of VIRUS, full form of virus in computer science, full form of virus wikipedia, virus full form in hindi, antivirus full form, computer full form, form-virus, what is the full form of virus
What is The Full Form of VIRUS

VIRUS Full-Form – Additional Information

The progress of the digital world has picked up an incredible pace for the last few decades, especially with the advent of computers. Without computers, one can hardly imagine a life. 

Almost everything we do seem to have some of the other connection with the digital world. The world has switched to computers that provide mechanisms that are more convenient.

When the computer was first invented, no one could have imagined that in future different varieties of computers would occupy the households, open cafes, business cabins, and other places. 

No one could have imagined that human beings would become so dependent upon these machines that almost everything in their lives would have some or other things to do with them. Because of the incredible dependency of humans on computers, computer engineers have been working hard to come up with better advancements to improve the services.

These computer engineers have big tasks to achieve and they are the tasks to protect the internal mechanism of computer systems, the database stored in them, and the interests of the consumers.

They now face the biggest challenge from tech-savvy miscreants who dispatch numerous computer viruses that possess the capability to destroy the functioning systems of the computers and render them useless.

A computer virus, or popularly known as a virus, refers to the biggest problem to the security of computer systems. It refers to a malware program, which functions like viruses affecting the human body. 

This program has the tendency to replicate by inserting its own copies into computer programs, files, or the boot sector of the hard drive. This replication happens when the virus is successfully executed. As soon as the virus conducts replication successfully, the files affected by it are referred to as “infected” areas.

Like a virus weakens or destroys the immune system of a human body similarly a computer virus has the capability to reduce the performance of or destroy the computer system. 

It can cause the stealing of hard disk space, accessing personal information stored on the computer database, displaying comical messages on the computer screen, showing explicit advertisements on the screen, sending spam, etc. 

Many computer viruses have the feature of installing themselves on the target computer system without the consent of the computer user. This feature is not common among all viruses. The operating system most affected by viruses is Microsoft Windows.

It is often asked why anyone would want to create viruses and transmit them to various computer systems. Well, the most common reasons for the deliberate creation of viruses are profit-making, stealing personal information, carrying out a political agenda, etc.

Many cases have come where viruses were created as a matter of time pass and entertainment. Whatever the reason may be, the computer virus has caused great economic losses of more than billions because it results in the dysfunctional computer systems, malfunctioned features, squandering of money, corruption of database, etc. 

Although there is much free ant-virus software available for the detection and elimination of computer viruses, the loss is still huge because many of this antivirus software is unable to detect all the viruses hidden in the system.

A computer virus is a serious concern to computer engineers as well as consumers. There are many aspects of computer virus which must be known to people because they affect a vital object of your life, computer. This article will deal with ten points of information about a computer virus that everyone must know.

Historical facts about Computer VIRUS:

To begin with, this topic, let us explore some historical facts about the computer virus. It is important to know where all this started and how it all started.

The first virus was detected on ARPANET, the predecessor of the Internet, during the 1970s. The virus was termed the “Creeper Virus”. It would be interesting to note that this virus was made on an experimental basis for the purpose of infecting DEC PDP-10 computers that functioned on TENEX Operating Systems. 

The virus was written by Bob Thomas. The Creeper virus, when successfully executed, would display a message on the display screen: “I’m the creeper, catch me if you can!”

In the year 1982, another virus known by the name Elk Cloner appeared. It was declared to be the first virus to infect personal computers. The virus was written by Richard Skrenta, who attached the virus with Apple DOS 3.3 operating system. The virus could spread through a floppy disk.

Fred Cohen had published a paper titled “Computer Viruses-Theory and Experiments” in the year 1984 that was the first paper to expressly use the term ‘virus’. In his paper, he explained that complete detection of all the computer viruses was not possible. It was Fred Cohen, who came up with the concept of compression virus that talked about viruses that he termed ‘benevolent’.

In the year 1992, Microsoft Windows witnessed its first attack. The virus named Winvir was detected in April month of the same year. The virus functioned with the help of DOS interrupts. Eventually, in the year 1995, the Boza group developed the VLAD virus that came to be known as the first virus to attack Windows 95.

Commodore Amiga was the first known virus to have affected home computers.
Even social networking websites could not remain untouched by the virus writers. Win32.5-0-1 is the first virus to have been directed towards social networking websites. 

It targeted MSN Messenger and Bulletin Boards. In this, the users of these sites would be asked to click on a link given, which if clicked, would cause the virus to activate. 

On activation, the user data will send to an unknown e-mail id. That e-mail id was later found to belong to the writer of the virus, Matt Larose.

The vulnerability of Operating Systems:

Different operating systems are differently vulnerable to viruses and thus differential factor often becomes one of the determining points on whether or not to buy a particular operating system.

As mentioned earlier, the most commonly affected operating system is Microsoft Windows. This is due to the massive popularity of this operating system across the globe, which makes it easier to distribute viruses. 

Operating systems like Linux, which are available in the form of the open-source operating systems, facilitate options for users to choose from like desktop environments, packaging tools, etc and this limits the effects of malicious programs. In operating systems like Linux, the virus would only affect a limited number of users. Unlike Linux, Microsoft Windows makes use of the same set of applications that allows the virus to impact a larger number of users.

Mac operating systems are preferred over Microsoft Windows and other operating systems because of their significant invulnerability to the virus. Records show that only a few viruses have been reported to affect Mac systems.

Another problem with Microsoft Windows is that it allows users greater freedom in making alterations in the operating system environment and many of these alterations can be easily done without any permissions. 

This feature is not available in operating systems like UNIX and Linux that do not enable users to make changes to the system’s environment without permission. Ease in making changes allows viruses to gain control over the operating system.

Social Engineering and other practices:

Before a virus could affect the system, it must be allowed to successfully execute code and write it to memory. That is why often viruses would cling to executable files, which when launched would cause the execution of the virus code.

Many operating systems like Windows often make use of file extensions that help in ascertaining the category of file. Many of these extensions are not visible to users and because of that, viruses take advantage. 

Viruses are able to create file extensions that seem different to users. Let us take up an example for clear understanding. Suppose an executable file is created with name abcd.png,exe. 

The user might believe it to be a file is an image. Thus, virus writers undertake many practices that can expose vulnerabilities in operating systems.

Resident and non-resident Computer Viruses:

Of all kinds of viruses, resident and non-resident viruses need to be especially discussed as they lay down broad distinctions between different kinds of computer viruses.

A memory-resident virus, also known as a resident virus, undergoes automatic installation meaning that the virus will be installed the moment the code is executed. 

After installation, the virus remains in the RAM (Random Access Memory) throughout the time the computer is booted and until it is shut down. 
These viruses attempt to intercept the access to a target file and redirect the control flow to the replication module. This way these viruses are able to infect the system.

On the other side, we have a non-memory-resident virus, also known as a non-resident virus. These viruses function quite differently from resident viruses. On being executed, the virus will undertake scanning of the disk to look for targets, infect them, and then leave the memory.

Macro Viruses:

Another category of viruses is Macro Viruses. Applications like Microsoft Outlook and Microsoft Word facilitate large-sized or macro programs into e-mails and documents. This facility enables the automatic run of the programs when document or e-mail is opened. A macro virus affects these applications.

A Macro virus, also known as document virus, is a virus that is scripted in the macro language. -These viruses are inputted into these documents or e-mail, which when opened cause execution of the virus code and then, infection of the computer system. It is therefore advised that unwanted attachments or files should not be opened.

Read request intercepts:

The virus writers always keep in their mind that the virus should be capable of avoiding detection and therefore, they make use of many deception techniques to achieve the task. These are called stealth mechanisms. One such method is read request intercepts.

When the antivirus software sends a read request to the Windows Operating System, some viruses are able to fool the antivirus software. They do so by intercepting its request to read infected files to the operating system. 

What it does is simple: it intercepts the request, handles the request itself, and provides the antivirus software with an unaffected/uninfected file. This way the virus remains undetected by the software.

This stealth strategy is achieved with the help of code injection of the actual files of the operating system. Code injection, for common knowledge, means misuse of a bug caused due to the processing of invalid data. 

A person would “inject” code into the system’s programs and change the manner in which execution takes place.
There is a way to detect stealth. One has to boot from a medium that is supposedly clean. Then, the antivirus software can be employed to scan the unused or inactive files on the operating system. This software also detects stealth through virus signatures.

Self Modification:

As mentioned earlier, the stealth mechanism is necessarily implanted into viruses so that they are able to avoid detection from antivirus software. 

We have already dealt with reading request intercept as one of the methods employed to evade detection; we shall now discuss modes of self-modification that viruses employ to secure stealth mode.

There can be many ways in which viruses can achieve evasion through self-modification. One such method is encryption. Encryption is one method to avoid the detection of virus signatures.

This type of encryption leaves only the encrypted module and cryptographic key. Many viruses may undertake encryption within an executable under exceptional circumstances for example, when the antivirus software is updating or when the computer has been rebooted. This method of encryption is known as Cryptovirology. In this, the virus may even possess the capability to disable the antivirus software.

Let us discuss the Polymorphic Code that needs special mention. It needs special mention because it was the first evasion technique adopted that raised serious concerns about the effectiveness of antivirus software. 

In this method, the virus causes infection of the files with the help of an encrypted copy of its own self. This encrypted copy is decrypted by a decryption module, which is altered on every infection caused. This alteration or modification, whatever you may call it, causes none of the parts of the virus to remain identical, making it easier to evade antivirus detection.

Another technique to avoid detection is metamorphic code. In this type of method, many viruses would undertake to rewrite of themselves each time they infect files. 

Such viruses are commonly known as metamorphic. These types of viruses are difficult to create, as they are large and more complex than other viruses’ forms. To employ this technique, it is essential that there is a metamorphic engine.

Antivirus Software:

One of the pre-emptive measures taken to protect the operating system from viruses is antivirus software. It is a common practice to download antivirus software that has the ability to significantly detect and destroy viruses from the operating system whenever the computer downloads or runs an executable. 

Nowadays there are many antivirus software that blocks websites containing malware. In order to have their scanner function properly, it is important that the software be regularly updated to “patch security vulnerabilities”.

There are many antivirus software in the market, offering various features to the users. Some of the software for Windows operating systems are Microsoft Security Essentials, the Windows Malicious Software Removal Tool, Windows Defender. There are also free programs available like Secunia PSI.

Antivirus software makes use of two methods to detect viruses. The first method is virus signatures, which is also the most common method of detection. It compares the database on the system with a list of virus signature definitions. 

The only issue with this method is that it can only detect viruses with signatures. The second method of detection is a heuristic algorithm. This method detects viruses whose signature is not updated in the software.

Computer Virus and Internet:

There is a strong connection between the virus and the internet. Before the Internet happened, the viruses were usually transmitted by means of floppy disks, CD-ROMs, etc. 

However, with the increase in the use of personal computers, of Bulletin Board System (BBS), of modems, and of software, Trojan Horse programs were easily transmitted. With time, the internet became a hotspot for the transmission of viruses. In the year 2002, the cross-scripting technique surfaced. In this technique, the attackers are able to inject virus code into webpages accessed by other users. It is often used to avoid access controls. 

This technique has especially affected websites like MySpace and Yahoo!

Recovery Methods:

It is not always possible to prevent virus attacks but the damage done can be contained. In order to avoid excessive damage, one must ensure backup of data on media that is not connected with the system or otherwise the media would also be affected. It is better if the media is read-only or operates different file systems. 

When a CD-ROM or DVD is used for backup and the back-up session closes, it becomes read-only and therefore, invulnerable to viruses unless of course an infected filed is copied into the CD/DVD.

Another method is the reinstallation of the operating system. On successful reinstallation, applications should be freshly downloaded and necessary precautions should be taken to prevent infection from restored executable files.

For Further Reading In Wikipedia: Click Here


For More Full Forms in A to Z Category: Click Here