sponser

Thursday, December 17, 2009

Computer virus

Introduction
Computer virus is not living organism. It is a type of computer program which is written by the programmer with the intent of destroying or damaging the data and programs residing in the computer system. It interferes in the normal functioning of the computer. It replicates itself by making copies of itself without the user’s knowledge or consent. The tasks of computer virus are often destructive. It deletes the important information, crashes the hard drive and also disturbs to execute programs. Each virus contains instructions to initiate a unique and problematic event on an infected computer. The effects of these events can range from general annoying to the great destruction.

How does a computer virus infect your computer?

A virus is usually passed through infected files of a disk and the internet. Some viruses only transfer if you boot your computer with an infected disk. Others can infect your system when you copy a file from an infected disk or even when you attempt to eras an infected disk. Viruses can be passed when you download a file from the internet or access data or programs on a network. If you install genuine software and rarely exchange disks with anyone else, it may reduce the risk of virus infection in the computer system. It makes higher risk of virus infection in the computer system, if your computer system. It makes higher risk of virus infection in the computer system, if your computer system comes more in contact with the internet or with the infected disks.

The main purpose of the virus is to infect as many programs as possible. Once the virus infects your computer system, it does various operations such as displaying pictures or massages on the screen periodically, erasing or destroying programs and data, infecting the application software like word processor, database and spreadsheet and causing some sort of malfunctioning of the computer system. It tries to remain hiding to support its activity, and it tries to infect as many systems as possible. They infect the system by attaching themselves to the files and programs.

1 comment:

  1. i am enjoyig these notes. thank you so much for these clear and lucid descriptions. keep up the good work.

    ReplyDelete