Preview

Essay Example, Research Paper: Computer Viruses

Good Essays
Open Document
Open Document
493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Essay Example, Research Paper: Computer Viruses
A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are a boot sector viruses, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computer’s memory. Once a virus is in memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after the Greek myth) hides within or is designed to look like a legitimate program. Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains. To detect computer viruses, antivirus programs have been developed.
Besides the detecting of the viruses, antivirus programs also have utilities to remove or repair infected programs or files. Some damaged files cannot be repaired and must be replaced with uninfected backup files. The table below outlines some techniques used to protect computer systems. Table Techniques for
Virus Protection and System Backup Using Virus

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    the chrysalids

    • 568 Words
    • 2 Pages

    atomic bomb- a bomb whose explosive force comes from a chain reaction based on nuclear fission in U-235 or plutonium.…

    • 568 Words
    • 2 Pages
    Good Essays
  • Good Essays

    2. Some terrorism experts believe that a “Dirty bomb” is a serious and viable WMD threat to the United States. What is a dirty bomb? What is it made of? What sort of safeguards should we place on potential “dirty bomb” materials?…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Atomic Bomb In Ww2 Essay

    • 862 Words
    • 4 Pages

    An atomic bomb is any kind of weapon which contains an explosion that results in energy being released by chemical reactions that involve atomic…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Outbreaks of Norovirus can occur almost anywhere in the world. In 2012, a new strain named GII.4 Sydney was identified. Since the first outbreak, the virus was quickly detected in New Zealand, France, and the U.S. A new outbreak of Norovirus occurred at Yellowstone National Park, causing illness in about 200 visitors and camp employees in June 2013. The virus has mutated enough that most people will not be immune even if they’ve had a Norovirus infection in the past. Outbreaks occur frequently. In 2015, outbreaks occurred in cruise ships, restaurants, and schools. The Star Princess cruise ship had at least two different outbreaks that sickened hundreds of people in 2015. In August 2015, 98 customers and 17 employees became ill due to a Norovirus outbreak at the Chipotle…

    • 655 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the Gospel according to St. John; Brooke Foss Westcott references Jesus’ “I AM” statement in John chapter 6:35 to the tree, water and fountain of life. “The bread of life, the food which…

    • 3460 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    magnets are very common. A floppy can be damaged unknowingly if it is kept near…

    • 1221 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Although computer viruses and biological viruses are not related in any way, they are very similar in many aspects. Both viruses need a host to replicate for a means of survival. Similarly, both enter their hosts passively. Biological hosts are infected by breathing, ingestion, or direct contact while infected software, email attachments and transfers infect the cyber host. Another notable similarity is the fact that both computer and biological viruses need the proper host as well as software and tissue specificity to reproduce efficiently. Computer viruses spread by inserting copies of itself in executable code and documents. Computer viruses can reduce the rate of computer performance, make files inaccessible, or completely wipes out the computer. In comparison, biological viruses replicate at the cost of the host by inserting itself into their cells which can result in pain, fever, and in the worse case, death.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Flip Flop Logic

    • 880 Words
    • 4 Pages

    Latches and flip-flops are the basic single-bit memory elements used to build sequential circuit with one or two inputs/outputs, designed using individual logic gates and feedback loops:…

    • 880 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Fritz

    • 765 Words
    • 4 Pages

    | A box with input and control logic on one side, and output on the other.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer hacking isn't something you here about everyday on the news. Really people don't have any knowledge about computer hacking. Everyday our identities go through about eight hundred computers a day. Every time we swipe a card, make a telephone call or connect to the internet our digital identities are recorded to keep track of who is doing what. Now the records are kept by different companies. The government also takes part in this game. These company computers are supposedly protected by anti-hacking programs. Well, unfortunately hacker can still get through. And when they get through your identity is up for grabs. This is what happening everyday and no one knows but the hacker and you. Until a hacker get control of a major corporate company, and then everybody in the world is talking about Enron's bank account being hacked into and sucked dry of all its money. Most people say hackers are greedy creatures that only want money. That is not always the case some hackers do it for fun, some do it for power, others do it because they don't won't to be ruled by the government. So, really and truly what are hacking programs? Where do they come from and what are the type's hackers?…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet & Email Threats

    • 1178 Words
    • 5 Pages

    A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.…

    • 1178 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Digital devices are categorized according to their function as combinational logic or sequential logic devices. The difference between two categories is based on the signal timing, for sequential logic devices the timing or sequencing history, of the input signals plays a role in determining the output, but for combinational logic devices the output depend only on the instantaneous values of inputs.…

    • 1697 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Python Notes

    • 10999 Words
    • 44 Pages

    * In a game, a Missile object could send a Ship object a message to Explode…

    • 10999 Words
    • 44 Pages
    Powerful Essays