Some general sources are mentioned .

A good example of a geometric series is the propagation of a computer worm.

Actually, the defense attorney's statement is ludicrous.

The prosecutors ignored that Smith's virus fraudulentlysent e-mails from each victim's computer tonew victims who were in previous victim's e-mail address book.

This virus infected the boot sector of 5¼ inchfloppy diskettes with a 360 kbyte capacity.

VAXcomputers running versions of the Berkeley UNIX operating system.

Departments on often receive donations from alumni to establish scholarship funds for students pursuing a particular major. These awards are typically small but since you’re only competing with other students at your college for funding, they may be fairly to get. Departments, such as , whose graduates can expect to go on to earn enough money to make sizeable donations to their alma mater will likely have the most major-specific scholarship opportunities, even though fields that typically produce relatively low-wage workers may have funds available. Your college advisor, your college’s , or your department’s main office or website will likely have information on scholarships available for students pursuing your intended major.

In November 1987, a virus was discovered infectingthe  file on DOS diskettes atLehigh University.

(I do cite a source for facts that are either not well known or controversial.)Further, this essay is not a formal scholarly document, with numerouscitations, but only an informative review intended forattorneys, legislators, the general public,students, businessmen, etc.

A student at a university in Germany created a wormin the REXX language.

He was found guilty on 22 Jan 1990and appealed, but the U.S.

The innovative feature of the Melissa virus was that it propagatedby e-mailing itself to the first fifty addresses in theMicrosoft Outlook e-mail program's address book.

Court of Appeals upheld the trial court's decision.

When this e-mail was received by someone who had Microsoft Word on his/her computer (even if their computer was an Apple Macintosh), and the recipient clicked on the attachment, the document would open and the Melissa virus would automatically infect Word's template file, thus infecting the recipient's computer.

Inquiries may also be directed to: U.S.

The Melissa virus was released on 26 March 1999and was designed to infect macros in wordprocessingdocuments used by the Microsoft Word 97 and Word 2000 programs.

Supreme Court refused to hear an appeal from Morris.

While Microsoft Outlook was necessary for the automatic sending of infected documents, the recipient of such e-mail could be infected even if the recipient used a non-Microsoft e-mail program.

Morris, 928 F.2d 504, 506 (2dCir.

When such infected documents were opened in Microsoft Word, the Melissa virus would automatically infect Word's template file, thus infecting the recipient's computer.

Denning, editor, Addison-Wesley, 1990.

Other viruses and worms have been much more widespread, and caused much moredamage, but their authors have generally been able to avoid prison(e.g., and)or received a sentence not much longer than Pile's(e.g., the author of the virus spent 20 months in prison, despite having done at leasta hundred times more damage than Pile).