The document discusses computer viruses and how they spread from one computer to another by infecting files on a network. It notes that viruses replicate themselves and many people incorrectly use the term virus to refer to other types of malware like adware and spyware. True viruses spread when a user transfers an infected file to another computer via means like email, removable storage, or over a network.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views4 pages
Simple Present 2
The document discusses computer viruses and how they spread from one computer to another by infecting files on a network. It notes that viruses replicate themselves and many people incorrectly use the term virus to refer to other types of malware like adware and spyware. True viruses spread when a user transfers an infected file to another computer via means like email, removable storage, or over a network.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
1.- Reading.
Read the text aloud and translate it orally. Pay attention to the pronunciation of words.
A computer virus is a computer program that
replicates itself and spreads from one computer to another. Viruses increase their chances of spreading to other computers by infecting files on a network file system. Many people erroneously use the term "virus" to refer to other types of malware, and they include in the same category adware and spyware programs that do not reproduce themselves. A true virus spreads from one computer to another (in some form of executable code) when a computer user takes its host to the target computer; for instance because a user sends it over a network or the Internet, or carries it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
Malware includes computer worms,
Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. People sometimes confuse viruses with worms and Trojan horses, which differ technically. A worm exploits security vulnerabilities and it spreads itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions.
Worms and Trojan horses, like viruses, can harm a
computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many more do not do anything to call attention to themselves. Some viruses do nothing more than reproduce themselves.
All the verbs in the text above are in the present simple