A computer virus is a malicious program that can replicate itself and infect other programs without user knowledge, potentially causing harm to the system. Various types of viruses include boot sector viruses, companion viruses, email viruses, macro viruses, worms, and Trojan horses, each with distinct characteristics and effects. Protection against viruses involves using antivirus software, firewalls, and safe browsing practices.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
25 views4 pages
XII T&CA Computer Virus Exercise Solution
A computer virus is a malicious program that can replicate itself and infect other programs without user knowledge, potentially causing harm to the system. Various types of viruses include boot sector viruses, companion viruses, email viruses, macro viruses, worms, and Trojan horses, each with distinct characteristics and effects. Protection against viruses involves using antivirus software, firewalls, and safe browsing practices.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
Class XII T&CA|
Computer Virus Exercise Solution
1.Define Computer Virus.
‘A Computer virus is a small program that which can attach it or infect the other
programs as well as replicate itself without the knowledge of the user, like its
biological counterpart, and runs against user's wishes.
‘A computer virus is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another. A virus
operates by inserting or attaching itself to a legitimate program or document that
supports macros in order to execute its code. In the process, a virus has the
potential to cause unexpected or damaging effects, such as harming the system
software by corrupting or destroying data. Some examples are aS
SS
Morris Worm Nimda ILOVEYOU SQL Slammer __Stuxnet
CryptoLocker — Conficker Tinba Welchia Shlayer
2. What is a virus? How does it differ from an ordinary progr: 2,
A virus is a small program written with malicious tar ordinary program is
written to do something meaningful harmless wee
3, How can you protect your computer from virutow\ 0
. Use antivirus protection and a firewall.
. Get antispyware software.
. Always keep your antivirus protection and antispyware software up-to-date.
: Update your operating system regularly.
. Increase your browser security settings.
. Avoid questionable Websites.
. Only download software from sites you trust.
~“
4, What is the sitoronea NOs the computer virus and biological virus?
Biological Virus Computer Virus
Parasitism | Replicates only inside the cells ofa | Replicates by copyingitself into |
living organism using their other computer programs.
Invisible | Replicates inside an organism fora _ | Can be programmed to cause harm
Phase while without any symptoms; known | only aftera certain event, such as
as the incubation period. the launch of an app. |
Mutation | Can produce copies with mutations | Can change the code in its copies
that may become resistant to to avoid detection by antivirus
antibodies and drugs. software.
Self- Can attack and/or compromise the | Can block antivirus software to
Defense _| immune system to protect itself. protect itself.5. What are the various types of viruses? Outline the net effect of each
Boot Sector Virus
Aboot sector virus damages or controls the boot sector on the drive, rendering the
machine unusable. The virus is activated when users plug in the USB device and boot
their machine.
After the introduction of boot-sector safeguards with the Operating Systems, itis not
possible for boot-sector viruses to infect the Computer.
Examples of boot viruses include: Polyboot.B, Joshi, Gravity, AntiEXE and Cbrain virus.
Companion Virus
a companion virus is computer virus which does not modify any files. Instead, it creates
a copy of the file and places a different extension on it, usually com.
Some examples include: Stator, Asimov.1539, Stator and Terrax.1069* 9S
Emi ‘us SS
An email virus is malicious software or a program that attaches itself t in Ito
infiltrate and infect your computer. Email viruses almost always are lit malware or
) . three ways it can be mropogg®
‘An Email Virus in Phishing Email
Email Vrs in an Altachment ¢
An Email Vitus in the Body ofthe Email ge
point of time but they do not replicate. It is se d upon the host network only when
certain conditions are met. Logic bo! soo their functions, or launch their payload,
once a certain condition is met suc! the termination of an employee.
Macro Virus \
AMAC or Macro Virus is a vi ich spreads to other computers through software
programs that utilize ma se Viruses infect the files created using some
applications or progr contain macros such as doc, pps, xls and mdb.
Examples of maer« lax, Melissa.A, Bablas, O97M/Y2K.
They usually fi es inside the computer memory and get activated during the
start of OS an infecting other opened files. They are hidden in RAM.
Cross-Sité\ Scripting Virus
Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute
malicious scripts in a web browser of the vietim by including malicious code in a legitimate web
page or web application. The actual attack occurs when the victim visits the web page or web
application that executes the malicious code.
WORM
The Worm is very similar to a virus and has the ability to self-replicate itself and infect
the computer also
It does not modity a program like a virus; however, it replicates so much that it
consumes the resources of the computer and makes it slow. Worms are independent
programs while viruses attach themselves to another program. Examples of Worm:
Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code Red, Nimda
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
Logic Bomb Na I
Logic bombs and time bombs are small males jgrams to cause harm at a certain :
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
1Trojan Horse
Itis similar to virus. Trojan horse is a hidden malicious code that could alter or delete
the information of client computer or perform any other unauthorized function
The activities of Trojans are:
*Deleting data * Blocking data * Modifying data * Copying data
‘+ Disrupting the performance of computers or computer networks
Trojan horse does not replicate themselves like viruses and do not infect other
software.
6. What is the difference between Trojan Horses, WORM and Virus? nN
Virus Worm Trojan Horse
Virus is a software or Worms replicate Trojan Horse rather than
computer program that itselftocausestow replicate capture some
connect itself to another down the computer important information about
software or computer system. a computer system ora
program to harm computer computer network.
system
Virus replicates itself Worms are also But Trojan horse does not
Virus can't be controlled by Worms canbe Like worms, Trojan horse
remote. controlled by can also be controlled by
remote. remote.
Spreading rate of viruses are While spreading rate And spreading rate of Trojan
moderate. of wormsare faster —_ horse is slow in comparison
than virus and Trojan of both virus and worms
horse.
6. Whatare'theleffects of a virus on the computer?
‘& Intrusive pop-ups
Slow performance
AS Frequent crashes
> Unknown login items
*& Storage space shortage
> Missing files
ob Increased network traffic
Browser homepage change
ob Hijacked email
“ Disabled antivirus
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
replicates itselt. replicate itsel. |
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
l
1
17. What is meant by Anti-Virus software? Name few popular anti-virus software,
Anti-virus software are software for your computer used to prevent, detect, and
remove malware, including computer viruses, worms, and trojan horses.
Some popular antivirus softwares are:
Norton Anti-Virus
McAfee
Kaspersky
Webroot
Symantec (Norton)
AVG
Microsoft Security Essentials
Quick Heal SN
EScan xO
Fill in the Blanks SS
1. A virus is inactive until you execute an infected program or appli
2. The virus was first found in 1949.
3. The biological virus contains the genetic material in the ha or RNA.
RRR RRR EE
4. The full form of Virus is VITAL INFORMATION RESOURCE SEIZE.
5. Viruses do not infect Zip, rar files unless the file was Bee ior to the compression.
6. Virus can infect only computer .
7. Boot-sector virus usually exists on master to hard disks.
The logic bombs are used to sabotage database.
9. The worm mostly attacks the host computers and spreads via a network_.
10. Trojan Horse does not replicate ROM viruses and do not infect other
software,
11. Which operating system is less ai by the virus Linux.
12. The virus is also attached with emails.
13. Once installed, a fanewie im can be set to work in the background.
\)
&