Giant Virus Essay

948 words - 4 pages

A team of people from the Aix-Marseille University found a giant virus in the permafrost in Siberia. The virus was so large that it could be seen with a light microscope, and was said to be over 30,000 years old. This virus has been named Pithovirus sibericum virus and is 1.5 micrometers long, which is much longer than the giant viruses that were found before it. The discovery of this virus has the science community scratching their heads about what family these newly found viruses belong to. Before the discovery of the Pithovirus sibericum virus, scientists believed that all giant viruses were part of the same family but now they aren’t sure (Rosen, 2014). In the following paragraphs, I ...view middle of the document...

A new strain of mimivirus was discovered and named the mamavirus. Within this strain they found a 50 nm virus that was named Sputnik (Smallridge, 2008). However while researching Sputnik, scientists observed that it was actually a parasite that targets mamaviruses. Another giant virus that was observed is the Paramecium bursaria chlorella virus; this is a virus that specifically infects algae (Van Etten, 1999).
When giant viruses first came into the light, it was observed that most of them had some type of irregularity in their genome. For example, the Sputnik virus has an 18,343 bp genome (Smallridge, 2008). Another example of a giant virus is the Paramecium bursaria chlorella virus; it has a larger than normal genome (Van Etten, 1999). Surprisingly, the Pithovirus sibericum virus has a relatively small genome for a mamavirus (Rosen, 2014). This information alone makes the Pithovirus sibericum virus very different from the mimiviruses and mamaviruses found prior to its discovery.
It’s fascinating that the Pithovirus sibericum virus is over 30,000 years old. Just the thought that anything, let alone a virus, has been able to live that long is absolutely shocking. After unearthing this ancient virus, scientists started worrying about all ancient viruses. The question is, could these viruses be harmful to humans because of how long they’ve survived.
In one of the articles, one of the authors said that they wouldn’t be surprised if another new giant virus was discovered tomorrow (Rosen, 2014). I also found it amazing how many times the mamavirus Sputnik was mentioned throughout all the different articles I found.
All the articles and information that I have acquired has been very accurate. Nothing in any of the articles sounded the least bit fabricated. The...

Find Another Essay On Giant Virus

Trojans,Worms, and Viruses: What Are They and What Can You Do to Stop Them

2339 words - 10 pages in the battle of Troy. This was a mythical battle that some people say never happened. Basically, Troy got in a war with another Greek city-state and the enemies built a giant wooden horse and the Trojans brought it in due to them thinking it was a gift. A Trojan virus works similarly and so the name was given (Trojan horse). So far, all that was explained was what Trojans are and what they do. But worms are nothing to forget about. Worms are a

Why I am interested in information security

683 words - 3 pages critical information back to the attacker. Also in 2012, another major virus called the televant virus infiltrated the company giant, Televant, which writes software to monitor energy industries. No one essentially knows what the virus did to its networks; however televant was sure that the attacker was able to get a hold of customer and employee files. All these attacks are daily reminders and demonstrations of what attackers could really do to our

The Importance of the Influenza Vaccine

1632 words - 7 pages that the cause of influenza was a virus. In the years after Richard Shope made his discovery, scientists continued to research influenza. In 1936, these scientists discovered that influenza can be grown in hen’s eggs. Different strains of the flu were soon discovered and classified into types. Americans became the first to receive the vaccine for influenza in 1941, a triumphant day in the history of medicine when mankind took a giant step

Closer to a Cure for Cystic Fibrosis

1299 words - 5 pages “the therapeutic gene to the patient’s target cells” (2). Currently, the most common vector is a virus because it can easily capture the gene and deliver it into the cell; the virus infiltrates the corrupt cells and places the healthy gene into the nucleus which then transforms the corrupt cell into one which operates properly (2). The only difficulty is that the body’s natural immune system provides many barriers for viruses trying to enter the

AIDS + HIV

2136 words - 9 pages IntroductionBeing one of the most fatal viruses in the nation, AIDS (AcquiredImmunodeficiency Syndrome) is now a serious public health concern in most majorU.S. cities and in countries worldwide. Since 1986 there have been impressiveadvances in understanding of the AIDS virus, its mechanisms, and its routes oftransmission. Even though researchers have put in countless hours, and millions ofdollars it has not led to a drug that can cure infection

The Consequences of Conjuntivitis: Red Eye

747 words - 3 pages inflammation in the eye area. The effect of viruses, bacteria, and allergies, is pink eye disease. For example, Viral conjunctivitis is the result of infection from herpes simplex virus (HSV), varicella zoster virus (VZV), or human immune deficiency virus (HIV). It can be transfer from one person to another. In addition, Bacterial conjunctivitis has common causes including staphylococci, streptococci, gonococci, and Chlamydia. Also, Allergic conjunctivitis

Roundup Ready Crops

2299 words - 10 pages person getting a small dose of the flu virus to build up and immunity to the flu. Roundup Ready crops allow farmers to spray their fields with Roundup to kill all weeds and grasses but not harm their crops. Although a Roundup Ready cropping system can have consequences if not used properly, Roundup Ready crops are a great advance in the agriculture world if they are used correctly. Today, one of the biggest issues with Roundup Read crops is the

Information Technology

1282 words - 5 pages individuals able to store documents and information in separate locations, on credit files and records. Life was fine and it was easy to decide what was common knowledge and what was kept private. But with the giant capacity of computers today, large amounts of data can now be stored at one location. Individuals and organisations all use one main database, thus allowing the risk of information being deleted, tampered with or stolen. Society sees this as a

History of Acquired Immune Deficiency Syndrome

5232 words - 21 pages History of Acquired Immune Deficiency Syndrome Acquired Immune Deficiency Syndrome (AIDS), specific group of diseases or conditions that result from suppression of the immune system, related to infection with the human immunodeficiency virus (HIV). A person infected with HIV gradually loses immune function along with certain immune cells called CD4 T-lymphocytes or CD4 T-cells, causing the infected person to become vulnerable to pneumonia

Ovine Pulmonary Adenomatosis

1687 words - 7 pages Ovine Pulmonary Adenomatosis (OPA) is an infectious lung cancer specific to sheep and is caused by jaagsiekte sheep retrovirus (JSRV). This is a type B retrovirus with a genome composed of linear, positive, single stranded RNA. Transmission is through inhalation of infectious virus or direct contact with infected respiratory secretions. It is found in many countries including the UK, in particular Scotland. The incubation period is long

Resident Evil

691 words - 3 pages Characters Alice, Rain, Matt, Spence, Kaplan, One and the Red Queen are the main Characters.Alice can?t remember much more then her name for a lot of the movie but starts to remember that she was sent to the hive to steel the T-Virus and give it to Matt?s sister to give to the press so it would put and end to the Umbrella Corp.Rain, Kaplan and One are part of a combat team that rescue Matt and Alice. They all basically have the same

Similar Essays

Intro To Computer Virus Essay

1571 words - 6 pages soldiers gained entry to the city of Troy in a giant, hollow wooden horse and thus captured the city, ending the Trojan War. Though not technically a virus it is still dangerous and could cause permanent damage to your operating system. A Trojan Horse program is a program disguised as a game, a utility or an application. When run, a Trojan Horse will do something devious to your computer while appearing to do something useful, such as deleting

The Influenza Virus Essay

607 words - 2 pages Summary Most viruses are miniscule, The influenza virus measures about 100 nanometers across, and has just 13 genes.In the past decade larger viruses have been found. French researchers recently discovered a giant virus which has a volume larger than the flu virus by a thousand-fold, and contains 2,556 genes. Interestingly the genes found only match 6% of the known genes on earth. Viruses were discovered on tobacco plants in the 1800s by

The Ebola Virus. In Depth Research Paper About The Ebola Virus. Disscusses Infection, Spread, Mortality Rates, Different Strains And Outbreaks

1337 words - 5 pages layers of gloves, and giant space suits. Only people with top government security are allowed into these airtight rooms where this all takes place. The virus is a member of the family filoviridae. In this family, there are only three viruses that apply, and they are all practically identical, with only one thing that distinguishes them from each other. This is "that their enzyme sequences, are slightly different"(Murphy, 2). While there are three

Computer Viruses Essay

754 words - 4 pages viruses worldwide. Over 2000 new viruses are being discovered every month. There are three main types of viruses: Trojan Horses, Worms and Email Viruses. Trojan Horses- A Trojan named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse that was sent as gift to the city of troy. This virus gets attached to some files in your computer and programs that you download from internet. As a result it starts destroying the file