Preview

Essay Example, Research Paper: Computer Viruses

Good Essays
Open Document
Open Document
493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Essay Example, Research Paper: Computer Viruses
A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are a boot sector viruses, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computer’s memory. Once a virus is in memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after the Greek myth) hides within or is designed to look like a legitimate program. Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains. To detect computer viruses, antivirus programs have been developed.
Besides the detecting of the viruses, antivirus programs also have utilities to remove or repair infected programs or files. Some damaged files cannot be repaired and must be replaced with uninfected backup files. The table below outlines some techniques used to protect computer systems. Table Techniques for
Virus Protection and System Backup Using Virus

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    the chrysalids

    • 568 Words
    • 2 Pages

    atomic bomb- a bomb whose explosive force comes from a chain reaction based on nuclear fission in U-235 or plutonium.…

    • 568 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Atomic Bomb In Ww2 Essay

    • 862 Words
    • 4 Pages

    An atomic bomb is any kind of weapon which contains an explosion that results in energy being released by chemical reactions that involve atomic…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2. Some terrorism experts believe that a “Dirty bomb” is a serious and viable WMD threat to the United States. What is a dirty bomb? What is it made of? What sort of safeguards should we place on potential “dirty bomb” materials?…

    • 428 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Outbreaks of Norovirus can occur almost anywhere in the world. In 2012, a new strain named GII.4 Sydney was identified. Since the first outbreak, the virus was quickly detected in New Zealand, France, and the U.S. A new outbreak of Norovirus occurred at Yellowstone National Park, causing illness in about 200 visitors and camp employees in June 2013. The virus has mutated enough that most people will not be immune even if they’ve had a Norovirus infection in the past. Outbreaks occur frequently. In 2015, outbreaks occurred in cruise ships, restaurants, and schools. The Star Princess cruise ship had at least two different outbreaks that sickened hundreds of people in 2015. In August 2015, 98 customers and 17 employees became ill due to a Norovirus outbreak at the Chipotle…

    • 655 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the Gospel according to St. John; Brooke Foss Westcott references Jesus’ “I AM” statement in John chapter 6:35 to the tree, water and fountain of life. “The bread of life, the food which…

    • 3460 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    magnets are very common. A floppy can be damaged unknowingly if it is kept near…

    • 1221 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer viruses parallel many facets of microbial infection. Unlike biological viruses, computer viruses can be thought of as a virus, worm, or Trojan infection. Computer viruses are programs that infect a computer and modify itself which permits it to spread throughout the computer’s software and hardware. Worms are programs that spread between computers through networking while a Trojan horse infection can make a computer available to non-authorized uses without knowledge from owner. Resembling biological viruses, computer viruses can be latent such as a herpes virus or HIV. Both have evolved to produce numerous variants and modified copies to ensure survival against their host’s means of evolving to protect against the infection. But what makes them different other than the obvious fact that computers viruses are “virtual” and biological are molecular based.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Flip Flop Logic

    • 880 Words
    • 4 Pages

    Latches and flip-flops are the basic single-bit memory elements used to build sequential circuit with one or two inputs/outputs, designed using individual logic gates and feedback loops:…

    • 880 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Digital devices are categorized according to their function as combinational logic or sequential logic devices. The difference between two categories is based on the signal timing, for sequential logic devices the timing or sequencing history, of the input signals plays a role in determining the output, but for combinational logic devices the output depend only on the instantaneous values of inputs.…

    • 1697 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Fritz

    • 765 Words
    • 4 Pages

    | A box with input and control logic on one side, and output on the other.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Python Notes

    • 10999 Words
    • 44 Pages

    * In a game, a Missile object could send a Ship object a message to Explode…

    • 10999 Words
    • 44 Pages
    Powerful Essays