Typo NOTES CHAPTER 7 Computer Virus
Typo NOTES CHAPTER 7 Computer Virus
Ans:
1- Most widespread virus infections spread through email message
attachments that activate when opened.
Ans.
1- When John Von Neumann introduced the concept of Self Replicating
Program in 1949.
2- The first commercial application of viruses appeared in 1985, when two
Pakistani brothers, in order to keep track of software piracy, used Brain Virus
(also known as Pakistani virus) on their low cost software.
3- It was an extra program not supplied by the original manufacturer.
4- These types of self-replicating programs multiplied so fast , they are a threat
to the smooth operation of a computer.
Ans.
1- Boot Sector Virus
2- Companion Virus
3- Email Virus
4- Logic Bomb
5- Macros Virus
6- Cross-site Script Virus
7- Worm
8- Trojan Horse
2- The infected code runs when the system is booted from an infected
disk.
4- Since the floppy disks are not used, the propagation of boot sector
viruses has got almost over.
7- After completing the booting of the system and running the OS, the
virus cannot infect the system.
Ans.
1- Companion virus is computer virus which does not modify any files.
2- Instead, it creates a copy of the file and places a different extension on it,
usually .com.
4- The companion virus is an older version of virus that was more prominent
during the MS-DOS.
5- It needs human intervention to further infect a computer but after the advent
of Windows XP, as there is no use of the MS-DOS, there are fewer ways for
this type of virus to propagate itself.
Ans.
1- Logic bombs and time bombs are small malicious programs to
cause harm at a certain point of time but they do not replicate.
2- They are not even programs in their own right but rather secret
segments of other programs.
Ans.
1- A MAC or Macro Virus is a virus which spreads to other computers through
software programs that utilize macros.
2- These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb.
3- For example, Microsoft Word and Microsoft Excel are two popular and
widely used programs which have the capability of executing macros.
5- They automatically infect the files, templates and documents with macros
that are contained in the file.
Ans.
disk from where they get loaded and have with them sufficient code to
3- Worms have been known to damage and infect the entire LANs.
4- It does not modify a program like a virus; however, it replicates so much that
program.
Ans
1- It is similar to virus.
2- Trojan horse is a hidden malicious code that could alter or delete the
information of client computer or perform any other unauthorized function.
3- Trojan horses contain programs that corrupt the data or damage the files.
4- It can also corrupt the software applications.
5- Trojans can illegally trace important login details of users online – for
example E-Banking.
6- The activities of Trojans are:
- Deleting data
- Blocking data
- Modifying data
- Copying data
- Disrupting the performance of computers or computer networks
7- Trojan horse does not replicate themselves like viruses and do not infect
other software.
8- The difference between bombs and Trojans is that, the bombs are insider
jobs, Trojans are brought in from outside by unsuspecting users through
other programs.
1- Computer Virus can slow down your computer performance and become
inefficient or run slowly.
4- Viruses can also wipe out the Boot Sector creating problems when you
boot into the windows, which contain system information.
5- It can make the changes in the data of the programs or files and cause
erratic results.
6- It might steal important information from your computer and send the
same to some other person.
10- If the virus deletes the entire keyboard definition; the computer would
not be able to respond to any keyboard inputs.
11- The virus might scramble the File Allocation Table (FAT) which
contains the information for the operating system. Any mishappening to
the FAT will cause data to be irrecoverably lost.
3- it is true that UNIX has something different to offer to its users and
many of Windows users have experienced this while operating
Windows.
3- People across the world are being able to use it without any major
support to minimize the attack of any Malware, especially when it
is compared with windows.
Q 16. How to Protect computer from Virus ?
8- Scan the computer using Virus Scanner while booting up the system.
10- Proper backup of all data and program files should be kept.
11- Remove suspicious and unnecessary files.