0% found this document useful (0 votes)
416 views13 pages

Typo NOTES CHAPTER 7 Computer Virus

Shad h na jaye aur loudu ko bul nahi h yaar me to get it now and I will get back to you tube channel name camera e l l o mere bhai bhai mene kaha par h ki nahi hota h na ho ga na

Uploaded by

Shashank Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
416 views13 pages

Typo NOTES CHAPTER 7 Computer Virus

Shad h na jaye aur loudu ko bul nahi h yaar me to get it now and I will get back to you tube channel name camera e l l o mere bhai bhai mene kaha par h ki nahi hota h na ho ga na

Uploaded by

Shashank Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

NOTES CHAPTER 7: COMPUTER VIRUS

Q1: What is Computer Virus ?


Ans
1- Full Form: Vital information resource under seize

2- Definition: A Computer virus is a small program that which can attach it or


infect the other programs as well as replicate itself without the knowledge of
the user, and runs against user’s wishes.

Q2: What are the harmful effect caused by Computer Virus?

Ans. These harm the computer in many ways such as:


1. Corrupt and delete the data or files.
2. Effect the functionality of software applications.
3. Effect the Hard Disk by erasing everything.
4. Use e-mail to infect the other computers.
5. The processing of the computer is also affected.
6. The virus also spread through the files downloaded on Internet.
7. The virus cannot infect write protected disks or written documents,
already compressed file and computer hardware, it only infects software.
Q3:What is the major way of spreading virus infection in computers ?

Ans:
1- Most widespread virus infections spread through email message
attachments that activate when opened.

2- Internet is the main reason of Virus Infection in Computers.


Q4: How computer virus evolved?

Ans.
1- When John Von Neumann introduced the concept of Self Replicating
Program in 1949.
2- The first commercial application of viruses appeared in 1985, when two
Pakistani brothers, in order to keep track of software piracy, used Brain Virus
(also known as Pakistani virus) on their low cost software.
3- It was an extra program not supplied by the original manufacturer.
4- These types of self-replicating programs multiplied so fast , they are a threat
to the smooth operation of a computer.

Q5. Differentiate Computer Virus and Biological Virus ?


Ans.

1- Biological viruses and Computer viruses are the same entity,


because both cause infection and damage to their host/target.

2- Computer virus is an electronic virus and Biological Viruses


(Human Virus) are tiny genetic codes DNA or RNA that take
over the machinery of a living cell and are capable of making
thousands of replicas of the original virus.

3- Like biological virus, the computer virus carries in it an


instructional code that makes copies of itself.

4- In computer, the virus takes temporary control of the disk


operating system and when it comes in contact with an uninfected
computer, the virus passes onto the uninfected computer also.
Q6. What are the different types of Computer Virus?

Ans.
1- Boot Sector Virus
2- Companion Virus
3- Email Virus
4- Logic Bomb
5- Macros Virus
6- Cross-site Script Virus
7- Worm
8- Trojan Horse

Q7 What is the Boot Sector Virus ?


Ans.
1- It is a type of virus which infects master boot record or hard disks.

2- The infected code runs when the system is booted from an infected
disk.

3- They infect at a BIOS level, they use DOS commands to spread to


other floppy disks.

4- Since the floppy disks are not used, the propagation of boot sector
viruses has got almost over.

5- After the introduction of boot-sector safeguards with the Operating


Systems, it is not possible for boot-sector viruses to infect the
Computer.
6- The computer is infected by this virus only if the virus is used to
boot up the system.

7- After completing the booting of the system and running the OS, the
virus cannot infect the system.

8- Examples of boot viruses include: Polyboot.B, Joshi, Gravity,


AntiEXE and Cbrain virus.

Q8 what is Companion Virus ?

Ans.

1- Companion virus is computer virus which does not modify any files.

2- Instead, it creates a copy of the file and places a different extension on it,
usually .com.

3- This makes a companion virus difficult to detect, as anti-virus software tends


to use changes in files as clue.

4- The companion virus is an older version of virus that was more prominent
during the MS-DOS.

5- It needs human intervention to further infect a computer but after the advent
of Windows XP, as there is no use of the MS-DOS, there are fewer ways for
this type of virus to propagate itself.

6- Some examples include: Stator, Asimov.1539, Stator and Terrax.1069

Q9 What is Email Virus ?


Ans.
1- An email virus is a virus which is attached to email
communications or sent with it.
2- different types of email viruses work in different ways, there are
also a variety of methods used to counteract such challenging
cyber-attacks.

3- Email viruses also vary in many ways.

a. In some cases the sender of an email virus may be unknown


to a user, or a subject line may be filled with silly text.

b. In some other cases, a hacker may cleverly disguise the email


as being from a known and trusted sender.

Q10 What is Logic Bomb?

Ans.
1- Logic bombs and time bombs are small malicious programs to
cause harm at a certain point of time but they do not replicate.

2- They are not even programs in their own right but rather secret
segments of other programs.

3- A logic bomb may be implemented by someone trying to damage a


database when they are fairly certain they won’t be present to
experience the effects, such as full database deletion.

4- In these instances, logic bombs are programmed to exact revenge


or sabotage work.
5- For example, a programmer could delete the critical sections of
code by establishing a logic bomb if he/she is terminated from the
company.

6- Logic bombs are most commonly installed by the insiders who


have the access to the system.

Q11. What is Macros Virus?

Ans.
1- A MAC or Macro Virus is a virus which spreads to other computers through
software programs that utilize macros.

2- These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb.

3- For example, Microsoft Word and Microsoft Excel are two popular and
widely used programs which have the capability of executing macros.

4- The macro virus is initially embedded in one document or a few documents,


but it can spread to other documents within the same computer, as well
reaching out to other computers through shared documents and infect the
other files, templates and documents also.

5- They automatically infect the files, templates and documents with macros
that are contained in the file.

6- They hide in documents shared through e-mail and networks.

7- Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.


8- They usually fix themselves inside the computer memory and get activated
during the start of OS and end up infecting other opened files. They are
hidden in RAM.

Q12. What is Cross-Site Scripting Virus?

Ans.

1- It is called Cross-site scripting (XSS).


2- It is an injection attack which is carried out on Web applications that accept
input, but do not properly separate data and executable code before the input
is delivered back to a user’s browser.
3- It mostly uses the vulnerable website as a vehicle to deliver a malicious
script to the victim’s browser.
4- During the page loading, the malicious script execute making the user
unable to avoid the attack.
5- The best example of XSS is Java-Script.

Q13 What is Worm ?


Ans
1- The Worm is very similar to a virus and has the ability to self-replicate itself

and infect the computer also.

2- They travel longer distances by storing themselves in critical areas of the

disk from where they get loaded and have with them sufficient code to

transfer themselves outward from the infected system.

3- Worms have been known to damage and infect the entire LANs.
4- It does not modify a program like a virus; however, it replicates so much that

it consumes the resources of the computer and makes it slow.

5- Worms are independent programs while viruses attach themselves to another

program.

6- Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson,

Code Red, Nimda.

Q14. What is Trojan Horse ?

Ans

1- It is similar to virus.
2- Trojan horse is a hidden malicious code that could alter or delete the
information of client computer or perform any other unauthorized function.
3- Trojan horses contain programs that corrupt the data or damage the files.
4- It can also corrupt the software applications.
5- Trojans can illegally trace important login details of users online – for
example E-Banking.
6- The activities of Trojans are:
- Deleting data
- Blocking data
- Modifying data
- Copying data
- Disrupting the performance of computers or computer networks
7- Trojan horse does not replicate themselves like viruses and do not infect
other software.
8- The difference between bombs and Trojans is that, the bombs are insider
jobs, Trojans are brought in from outside by unsuspecting users through
other programs.

Q 15 How virus is vulnerable to computer system ?


Ans.

1- Computer Virus can slow down your computer performance and become
inefficient or run slowly.

2- it tends to fill up the computer with useless data.

3- Virus can corrupt the system files.

4- Viruses can also wipe out the Boot Sector creating problems when you
boot into the windows, which contain system information.

5- It can make the changes in the data of the programs or files and cause
erratic results.

6- It might steal important information from your computer and send the
same to some other person.

7- It might reset or reboot a computer by sending the required codes.

8- It might format a disk by sending the formatting command to the system


thereby causing to lose everything on the disk.
9- The computer gets restarted frequently by itself.

10- If the virus deletes the entire keyboard definition; the computer would
not be able to respond to any keyboard inputs.

11- The virus might scramble the File Allocation Table (FAT) which
contains the information for the operating system. Any mishappening to
the FAT will cause data to be irrecoverably lost.

Q 16 How Virus vulnerable to operating system ?


1- There are many Operating systems in the market such as Mac,
Windows, Linux, UNIX, DOS etc.

2- Before selecting any operating system, there is always a question:


a. “Which Operating System is efficient enough to prevent
virus”?

b. Viruses are not restricted to DOS or Windows.

c. A virus has the capability of infecting any type of computer,


irrespective of the Operating System it runs.

d. Virus writers are like other software developers in their


desire to develop for the biggest market.

e. It depends on the users how long he or she can keep it off of


viruses.
DOS vs. Linux

1- As an operating system, Linux works much better than DOS.

2- In terms of performance Linux is more reliable than any other


operating system, even windows. It easily lowers the number of
viruses.

Windows vs. UNIX

1-A common belief is that UNIX as an operating is a safer option than


using Windows.

3- it is true that UNIX has something different to offer to its users and
many of Windows users have experienced this while operating
Windows.

Linux and Mac

1- Linux and Mac operating systems are less vulnerable to virus


attack as these two systems need advantaged access to install and
run any kind of viruses.

2- LINUX can be installed in Super computers to embedded


processors and the Windows is the most recommended OS for
desktop.

3- People across the world are being able to use it without any major
support to minimize the attack of any Malware, especially when it
is compared with windows.
Q 16. How to Protect computer from Virus ?

It is always advisable to the follow the dictum “Prevention is better than


cure”.

1- Use updated anti-virus program.

2- Do not copy pirated software on your computer.

3- Use the legal software from the reliable sources only.

4- Do not download suspicious shareware programs.

5- Use a secure operating system.

6- Allow you to schedule scans to automatically run for you.

7- Avoid letting the system to be used by unauthorized users.

8- Scan the computer using Virus Scanner while booting up the system.

9- Avoid loading of games that are passed as freeware.

10- Proper backup of all data and program files should be kept.

11- Remove suspicious and unnecessary files.

12- Make system files “Read only”.

13- Use vaccines and immunization programs to immunize


computer against virus infection.

14- Always protect your password.


15- Keep windows updated.

16- Use the scanned USB drives

Q17. List Popular Antivirus



Ans.
Norton Anti-Virus
McAfee
Kaspersky
Webroot
Symantec (Norton)
AVG
Microsoft Security Essentials
Quick Heal
EScan

Q18 How Antivirus can perform its duties?


Ans
1- Preventive
2- Detection
3- Vaccination
4- Inoculation
5- Damage Control

You might also like