Chapter 1 Practice 4 Solution

Chapter 1 Practice 4 Solution - Kelly Cleapor Chapter 1...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Kelly Cleapor Chapter 1 Practice Exercise 4- Protecting Your System Protecting My System A Brief Discussion of Back Up and Computer Viruses Kelly Cleapor
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction to Computer Viruses A computer virus is an actively infectious program that attaches itself to various files and has the ability to alter the way your computer works. A computer virus, unlike a human virus, does not occur naturally. Instead, it is deliberately created by an individual who is intent on wrecking havoc. A computer virus can corrupt the program and/or data files on a hard disk and in extreme instances can erase every file on a system. The virus may or may not announce itself. The Stoned virus, for example, continually displays a message that your computer is stoned. Other viruses are silent and affect the computer’s operation. Program execution may slow significantly or cease altogether. Unusual error messages may appear on your screen and/or you may run out of memory or disk space. A virus is transmitted in two ways, from an infected floppy disk or via a file that was downloaded from the Internet. Once a system is infected, the typical virus can copy itself onto every floppy disk that is put into your floppy drive, which in turn can infect other computers if the same disk is used elsewhere. In other words the floppy disk given to you by your well-meaning friend or colleague can transmit the virus to your computer. The Internet is even more of a threat because the typical user is online several
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2008 for the course COINS 209 taught by Professor Holladay during the Spring '08 term at Charleston Southern University.

Page1 / 4

Chapter 1 Practice 4 Solution - Kelly Cleapor Chapter 1...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online