Videos Related with Types and Protection of Computer Viruses

Note on Types and Protection of Computer Viruses

  • Note
  • Things to remember
  • Videos
  • Exercise
  • Quiz

Computer virus is a term given to man-made computer software or system to destroy computer programs or computer. Virus destroys data, useful application, programs and even the operating system. Computer virus hide themselves in other host files. They are not visible to us. The viruses can corrupt, delete files and programs.There are different types of viruses and their nature varies from each other.

The different types of viruses on the basis of their infected area are described below:

  1. Message carrying virus

    Message carrying virus does not infect the program and files but sometimes it produces unnecessary message or picture on the screen which disturbs the computer user.

  2. Boot sector virus

    Boot sector virus infects the information system during the start-up process. It tends to create bad sector of the hard drive or floppy disk. The virus infects the system by using infected diskettes during start up. The entire computer system becomes slow by reading the virus from the disk boot sector.

  3. System or file infector virus

    System infector virus infects the various parts of the operating system or master control program software. This virus prevents our computer system from booting, infects the .com or .exe or . sys files in the computer system.

  4. Bomb virus

    This virus is known as logical Bomb and Time bomb. This type of virus hides on the disk and waits for specific events to occur before running an event triggered routine in a program that causes a program to crash defined as bomb.

  5. Macro virus
    Macro virus reside inside files. Macro virus are commands which are designed to infect a specific type of document file such as MS-Word or MS-excel support user designed macro.
  6. Trojan horse
    Trojan horse or Trojan is a program that act like a normal part of a program but it performs another function. It is malicious program that appears to be friendly. It can be dangerous sometimes . Some Trojan horse appears to be a computer game, but while you enjoy the game, it may happily formatting your hard disk .

Protection from virus

Computer viruses are very harmful to computer system. They can destroy data and information. So, computer should be protected from viruses.

The computer system can be protected from the viruses by the following ways:

  • Install anti-virus software from a well known, reputed company and use it regularly.
  • Do backup your entire system on a regular basis. Because some viruses may erase or corrupt files on your hard disk.
  • Do not use any pirated software.
  • Lock the computer system using password to prevent your computer from being used by others.
  • Do not download any programs from the internet unless you are confirmed that they are virus free.
  • Be careful while checking mail having attached documents.

  • Computer virus is a term given to man-made computer software or system to destroy computer programs or computer.
  • The different types of viruses on the basis of their infected area are Message carrying virus, Boot sector virus, System or file infector virus, Bomb virus, Macro virus, Trojan horse.
  • Boot sector virus infects the information system during the start-up process.
  • System infector virus infects the various parts of the operating system or master control program software. 
  • Macro virus are commands which are designed to infect a specific type of document file such as MS-Word or MS-excel support user designed macro.
  • Trojan horse or Trojan is a program that act like a normal part of a program but it performs another function.
.

Very Short Questions

Boot sector virus infects the information system during the start-up process. It tends to create bad sector of the hard drive or floppy disk. The virus infects the system by using infected diskettes during start up. The entire computer system becomes slow by reading the virus from the disk boot sector.

Antivirus software are those software that can protect from virus so that your computer system runs smoothly.
Any four antivirus software are as follows:

  • Norton Antivirus
  • Kaspersky
  • PC-cilin
  • Norman Virus Control.

Any four preventive ways to protect computer system from computer viruses are as follows:

  • Install antivirus software and update the virus definition file frequently.
  • Install the firewall.
  • Install the latest security patch program.
  • Scan the computer for viruses regularly.

Computer virus is a destructive program, which replicates itself by making copies of itself without the user's knowledge. It is developed by the programmer by the help of internet for destroying or damaging the data, information and programs residing in the computer system. It disturbs the normal functioning of the computer. The various types of computer viruses are:

1) boot sector virus
2) Program or file virus
3) Multipartite virus
4) Stealth virus
5) Macro virus
6) Polymorphic virus

Some destructive effects of computer viruses are:
1) virus can change the contents of the files and codes of programs.
2) Virus can delete and destroy data, information and programs.
3) Virus can replicate and spread from one file to other files.
4) Load and run unwanted applications or programs

0%
  • A program that act like a normal part of a program but it performs another function is ____________.

    bomb virus
    trojan virus
    macro virus
    boot sector virus
  • Which virus infects the information system during the start-up process?

    Boot sector virus
    Trojan virus
    Bomb virus
    Macro virus
  • Which virus prevents our computer system from booting and infects the .com or .exe or . sys files in the computer system?

    Trojan virus
    System infector virus
    Boot sector virus
    Macro virus
  • Which virus does not infect the program and files?

    Trojan virus
    Message carrying virus
    Boot sector virus
    Macro virus
  • You scored /4


    Take test again

DISCUSSIONS ABOUT THIS NOTE

No discussion on this note yet. Be first to comment on this note