Midterm Lesson3
Midterm Lesson3
Lesson Objectives:
At the end of this lesson, you will be able to:
● Elucidate the types of network topology and
explaining the difference of each
● Define and differentiate the different computer
viruses and identify how this viruses can harm the
device
Computer Virus
is like a human virus that attacks devices. It can harm
the device easily depending on the capacity of the virus
that invades the device.
The teletype message displayed on the screens read, “I’m the creeper: Catch me if you can.” But the original
wild computer virus, probably the first one to be tracked down in the history of computer viruses was “Elk Cloner.”
The Elk Cloner infected Apple II operating systems through floppy disks. The message displayed on
infected Apple Computers was a humorous one. The virus was developed by Richard Skrenta, a teenager in the year
1982.
Even though the computer viruses were designed as a prank, it also enlightened how a malicious program could be
installed in a computer’s memory and stop users from removing the program.
It was Fred Cohen, who coined the term “computer virus” and it was after a year in 1983. The term came into being
when he attempted to write an academic paper titled “Computer Viruses – Theory and Experiments” detailing about the
malicious programs in his work.
1. Boot Sector Virus
This type of virus infects the master boot
record and it is challenging and a complex task to
remove this virus and often requires the system to
be formatted.
Mostly it spreads through removable media.
basta may boot - Boot sector
4. Multipartite Virus
- This type of virus spreads through multiple ways. It infects both the boot sector and executable files at the
same time.
Multi - keyword nan, tapos edi kapag mulitple syempre pwede sa marami
5. Polymorphic Virus
- These type of viruses are difficult to identify with a traditional anti-virus program. This is because the
polymorphic viruses alters its signature pattern whenever it replicates
Polymorphic - may pattern tapos nag re-replicate
6. Overwrite Virus
- This type of virus deletes all the files that it infects. The only possible mechanism to remove is to delete the
infected files and the end-user has to lose all the contents in it. Identifying the overwrite virus is difficult as it
spreads through emails.
Overwrite - edi in short nabubura lahat
7. Space filler Virus
- This is also called “Cavity Viruses”. This is called so as they fill up the empty spaces between the code
and hence does not cause any damage to the file.
Sa ngipin?
Macro? - Micro?
1. Think of something that can prevent viruses from damaging your computer. (minimum of 5 sentences maximum of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
_____________________.
2. What are the best ways to take good care of your device in your own words. (minimum of 5 sentences maximum of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
______________________________.
3. What percentage do you think you are in taking good care of your device? Explain briefly. (minimum of 5 sentences maximum
of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________