Computer Assignmnt 2
Computer Assignmnt 2
Computer Assignmnt 2
(December 12,2019)
BY
SHAKILA ANJUM
ROLL # 18071517-002
Submitted To
Sir Kamran
Centre for language and translation studies
UNIVRSITY OF GUJRAT
Contents
Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from
functioning normally, and often requires something powerful to get rid of it. A computer virus is very
similar. Designed to replicate relentlessly, computer viruses infect your programs and files, alter the
In 2013, the botnet virus Gameover ZueS was discovered to use peer-to-peer downloading sites to
distribute ransomware and commit banking fraud. While tens of thousands of computer viruses still
roam the internet, they have diversified their methods and are now joined by a number of malware
Even if you’re careful, you can pick up computer viruses through normal Web activities like:
Some computer viruses are programmed to harm your computer by damaging programs, deleting
files, or reformatting the hard drive. Others simply replicate themselves or flood a network with
traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can
significantly disrupt your system’s performance, sapping computer memory and causing frequent
computer crashes.
Computer viruses have been around for quite a bit and nearly all of them have been spread through
the Internet or its predecessors. Most viruses have been designed to steal users’ information,
The first computer virus, called “Creeper system”, was an experimental self-replicating virus released
in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was
boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers
“The Morris” was the first Computer virus which spread extensively in the wild in 1988. It was written
by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the
size of the internet. His approach used security holes in sendmail and other Unix applications as well
as weak passwords, but due to a programming mistake it spread too fast and started to interfere with
the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back
Since then, many new viruses have been introduced and the trend is growing exponentially every
year.