0% found this document useful (0 votes)
46 views5 pages

Virus Edit

Chapter 14 discusses computer viruses, which are harmful programs that can infect computers, slow performance, and steal information. It outlines various types of viruses, their sources, symptoms, and prevention methods, including the use of antivirus software. Examples of antivirus programs such as Norton, McAfee, and Kaspersky are also provided to help safeguard against these threats.

Uploaded by

mostmoh364
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views5 pages

Virus Edit

Chapter 14 discusses computer viruses, which are harmful programs that can infect computers, slow performance, and steal information. It outlines various types of viruses, their sources, symptoms, and prevention methods, including the use of antivirus software. Examples of antivirus programs such as Norton, McAfee, and Kaspersky are also provided to help safeguard against these threats.

Uploaded by

mostmoh364
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SUBJECT: ICT GRADE: 7 ( )

Name of the student: _____________________________ Date: _____________

Chapter 14- Computer Virus

A computer virus is a harmful program that can infect your computer, slow it down, delete
files, or steal information. It spreads when you open infected files or download harmful
software. To stay safe, use antivirus software and avoid opening suspicious emails or files.

Types of viruses:

1. File Infector Virus:

This type of virus attaches itself to executable files (like .exe or .com). When the
infected file is run, the virus activates and can spread to other files or systems.

2. Boot Sector Virus:

Infects the system’s boot area and activates when the computer starts. This virus
infects the master boot record (MBR) of a hard drive or a removable storage device.
It loads before the operating system, making it harder to detect and remove.

3. Executable File Virus:

Similar to file infector viruses, this type specifically targets executable files. It runs
when the executable file is launched, often corrupting or altering other system files.

Examples of viruses

1. Worm

A worm is a type of virus that spreads on its own through the internet or networks.
It is quite harmless and simply replicates itself. It doesn’t need to be attached to a
program or file. Worms can slow down networks and fill up storage.

Page 1 of 5
Prepared by Ms. Rifaya
2. Trojan Horse

This virus hides inside a file or program that looks useful or safe. Once opened, it
can steal data, damage files, or let hackers into your system.

It can spread through the atttachment of email or by sending the copies of itself to
the people in address book of the user whose computer is infected.

3. Rootkit

A rootkit hides deep in your system and gives hackers secret control of your
computer from remote location. It’s hard to detect and often works with other
malware.

4. Sleeper Virus

This virus stays inactive for a while after entering your system. It “sleeps” until a
specific time or action wakes it up and activates the attack. This steals your personal
and financial information.

5. Alabama Virus

It is an old virus from the 1980s. It displayed a message like “Welcome to the
Dungeon” and could corrupt data. It was mostly spread on early personal
computers.

It is a computer virus hug infects .EXE files. The virus manipulates the file allocation
table and swaps file names so that files are slowly lost.

6. Logic Bomb

It is a hidden piece of code that triggers when certain conditions are met (e.g., a
specific date, opening a file). It can delete files or crash the system.

7. Christmas Virus (or Christmas Tree EXEC)

A virus that spreads via email as a small, executable file with a variety of names and
extensions. The worm propagates by emailing itself as an attachment to any
address. Infected email messages arriv with the subject “Merry Christmas” and
body “Happy Holidys!”. The attachment has the name “postcard” followed by an
executable extension.

Page 2 of 5
Prepared by Ms. Rifaya
Sources of viruses

1. Infected Storage Devices

What it is: Viruses can hide in USB drives, CDs, or external hard drives.

Example: You plug in a friend’s USB to your computer, and it secretly installs a virus.

Result: The virus may copy itself to your files or steal data.

2. Email Attachments

What it is: Emails may have infected attachments or dangerous links. You cannot get an
email virus from a message that contains text. If you forward the attachment to other
people, their computers will also be affected.

Example: You get an email saying “You won a prize!” with a file attached. You open it, and a
virus installs.

Result: The virus might lock your files or send itself to your contacts.

3. Internet Downloads

What it is: Downloading files from unsafe or fake websites can bring viruses.

Example: You download a “free movie” from a random site, but it’s actually a virus.

Result: It might slow down your computer or track your activity.

4. Illegal Distribution of Software

What it is: Using a CD to install software copied from infected computer bring virus.

Example: You copy a software on a CD from your infected computer to distribute to


someone.

Result: The person who installs the software on his computer also gets infected with virus.

Page 3 of 5
Prepared by Ms. Rifaya
Symptoms of computer virus

Here are some common symptoms of a computer virus in simple terms:

1. Slow Performance – Your computer takes longer to start or run programs.


2. Frequent Crashes – It keeps freezing or restarting on its own.
3. Pop-up Ads – Unwanted ads appear, even when you’re not browsing.
4. Programs Opening or Closing Automatically – Strange things happen without you doing
anything.
5. Missing or Corrupted Files – Files suddenly disappear or won’t open properly.
6. High Internet/Data Usage – Your internet slows down or uses too much data
unexpectedly.
7. Disabled Security Software – Antivirus or firewall turns off without your action.
8. Unusual Messages – Weird error messages or alerts pop up.
9. Unauthorized Access – Unknown users or activities happen on your system.
10. New or Unknown Programs – Apps or icons appear that you didn’t install.

Virus Prevention:

1. Avoid Suspicious Emails and Links

Don’t open emails, attachments, or links from unknown senders.

2. Download Only from Trusted Sources

Get software, games, or media from official or safe websites only.

3. Keep Software Updated

Always update your operating system, apps, and antivirus to fix security holes.

4. Anti – virus prevention

Anti -virus software is used to prevent, detect and remove malware and other computer
viruses.

Page 4 of 5
Prepared by Ms. Rifaya
Install an antivirus program to safeguard your computer from virus attacks and update it
regularly. Install trusted antivirus software to detect and remove viruses before they cause
harm.

Examples of Anti-virus softwares:

1. Norton Antivirus

Developed and distributed by Symantec Corporation.

It is a well-known antivirus that protects against viruses, malware, and online threats.

It is easy to use, with features like safe browsing, password manager, and cloud backup.

2. McAfee

It is popular antivirus software that provides real-time protection and internet security.

It includes tools to block dangerous websites and keep personal info safe.

3. Kaspersky Antivirus

It is a strong virus protection with a simple design.

It scans for malware, spyware, and phishing threats. It is known for high detection rates.

4. Panda Antivirus

Cloud-based antivirus that’s lightweight and easy on your computer.

It offers basic protection plus features like USB scanning and a rescue kit.

5. AVG Antivirus

It is a free and paid antivirus with solid basic protection.

It blocks viruses, unsafe links, and email threats. Good for everyday users.

Page 5 of 5
Prepared by Ms. Rifaya

You might also like