Editing 1180: Virus Venn Diagram

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 12: Line 12:
 
When computers don't function as expected, a common response from ordinary users is "Maybe it has a {{w|Computer virus|virus}}?".  However, most of these situations can be explained by faulty hardware (freezing, blue screen, etc.) or software (crashes, errors, apparent lack of response to input, etc.), a general lack of maintenance (too slow to start up, too much clutter on screen, etc.), or user error.  A virus can potentially cause those symptoms, but it's much more common for them either to cause immediate and massive damage (rendering the computer completely unusable, wipe the disk, display obvious propaganda, etc.), or to remain stealthy with no obvious symptoms (logging keystrokes, exfiltrating sensitive information, receiving commands in the background, etc.).  Of course there is no clear separation and there is always some overlap between the two scenarios, so the diagram is not meant to be taken literally.
 
When computers don't function as expected, a common response from ordinary users is "Maybe it has a {{w|Computer virus|virus}}?".  However, most of these situations can be explained by faulty hardware (freezing, blue screen, etc.) or software (crashes, errors, apparent lack of response to input, etc.), a general lack of maintenance (too slow to start up, too much clutter on screen, etc.), or user error.  A virus can potentially cause those symptoms, but it's much more common for them either to cause immediate and massive damage (rendering the computer completely unusable, wipe the disk, display obvious propaganda, etc.), or to remain stealthy with no obvious symptoms (logging keystrokes, exfiltrating sensitive information, receiving commands in the background, etc.).  Of course there is no clear separation and there is always some overlap between the two scenarios, so the diagram is not meant to be taken literally.
  
βˆ’
The title text refers to the {{w|technological singularity}}, a hypothetical point in the future when {{w|superintelligence}} emerges in computers, so that they can build new computers with ever increasing intelligence. It is seen as impossible to predict what would happen beyond this point; hence the term "singularity". [[1084: Server Problem]] makes a joke on this.
+
The title text refers to the {{w|technological singularity}}, a hypothetical point in the future when {{w|superintelligence}} emerges in computers, so that they can build new computers with ever increasing intelligence. It is seen as impossible to predict what would happen beyond this point; hence the term "singularity". ([[1084: Server Problem]] makes a joke on this.)
  
 
"Defragging" is short for {{w|disk defragmentation}}, an easy, user-friendly action that PC users can undertake to supposedly make their computers run faster. It is therefore a common all-round recommendation to do this, regardless of the problem. [[Randall]] suggests the same clueless users would encounter the singularity and attempt defragging. It probably won't help much.{{Citation needed}}
 
"Defragging" is short for {{w|disk defragmentation}}, an easy, user-friendly action that PC users can undertake to supposedly make their computers run faster. It is therefore a common all-round recommendation to do this, regardless of the problem. [[Randall]] suggests the same clueless users would encounter the singularity and attempt defragging. It probably won't help much.{{Citation needed}}

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)