SlideShare a Scribd company logo
1 of 17
Presented By- DISHA PATEL
CLASS – VII-D
ROLL NO.- 13
SUBMITTED TO-
MRS. khusHboO sahai
A
PRESENTATION ON
COMPUTER VIRUS
Introduction
How Does It Spread
Symptoms
Prevention
Types Of Computer Virus
Boot Sector Virus
Program File Virus
Multipartite Virus
Macro Virus
Malware
Worm
Spyware
Trojen Horse
Conclusion
Computer viruses are a type of software program
that, like a biological virus, reproduces and spreads
itself.
Full Form: Vital Information Resource Under Seizes.
Some virus may display only a message on the
screen, others may slow down the Pc.
They can also erase files or even format your floppy
or hard disk and crash the system.
Creeper Virus: The first detected on APRANET in the
early 1970's.
Popular Viruses: Jerusalem or Israeli Virus, Brain or
Pakistani Virus, April First, Ping Pong or Bouncing
Ball, Stoned, Dark Avengers, Love bug, Ransomware.
 Computer viruses spread by attaching themselves to other computer
program file.
 When you exchange a file or pen drive with a virus, the virus
spreads from one computer to the another.
 Viruses also spreads when a Computer Engineer comes to repair your
system and puts his/her diagnostics disks in your PC.
Letters looks like they are falling to the bottom of the screen.
The computer system becomes slow.
The size of available free memory reduces.
The hard disk runs out of space.
The computer does not boot.
Fail to print correctly.
Restarts itself often.
Upload and use antivirus software.
 Be aware of the e- mails and attachments you open.
 Check for updates on antivirus software regularly.
 Make sure antivirus software is installed correctly.
On the computer, turn on the firewall.
Keep the computer operating system up to date.
Boot Sector Virus
Program File Virus
Multipartite Virus
Macro Virus
Infects the boot or Master Boot record (MBR), contains info about
the drive and the bootstrap loader of diskettes and hard drives
through the sharing of infected disks and pirated software
applications.
Once your hard drive is infected all diskettes that you use in your
computer will be infected.
Becomes active when the program file (usually with
extensions BIN, COM, EXE, OVL, DRV) carrying the virus is
opened.
It then makes copies of itself and will infect other programs
on the computer.
Hybrid of a Boot Sector and Program viruses.
It infects program files and when the infected
program is active it will affect the boot record.
Programmed as a macro embedded in a document, usually
found in Microsoft Word and Excel.
Once it gets in to your computer, every document you
produce will become infected.
Relatively new type of virus and may slip by your antivirus
software if you don't have the most recent version
installed.
Malware, short for malicious software, refers to any intrusive
software developed by cybercriminals (often called hackers) to steal
data and damage or destroy computers and computer systems.
Examples of common malware include viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
A computer worm is a type of malware whose primary function is
to self-replicate and infect other computers while remaining active
on infected systems. A computer worm duplicates itself to spread
to uninfected computers.
Spyware is a type of malicious software -- or malware -- that is
installed on a computing device without the end user's knowledge.
It invades the device, steals sensitive information and internet
usage data, and relays it to advertisers, data firms or external
users.
Trojan horse is a program downloaded and installed on a computer
that appears harmless, but is, in fact, malicious. Unexpected
changes to computer settings and unusual activity, even when the
computer should be idle, are strong indications that a Trojan is
residing on a computer.
Computer viruses and worms can so easily
be placed into your work station so you
must be careful when going on the
internet, opening emails from unknown
users, make sure you have some kind of
anti-virus software and always get updates
so that you aren't helping to spread viruses
and worms Other people as well as
harming yourself and your pocket.
DISHA PATEL COMPUTER VIRUS PPT.pptx

More Related Content

Similar to DISHA PATEL COMPUTER VIRUS PPT.pptx

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
sameer1993
 

Similar to DISHA PATEL COMPUTER VIRUS PPT.pptx (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

More from CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY

More from CENTRAL INSTITUTE OF PETROCHEMICALS ENGINEENRING AND TECHNOLOGY (12)

CP SEMINAR.pptx
CP SEMINAR.pptxCP SEMINAR.pptx
CP SEMINAR.pptx
 
tushar is - 13488.pptx
tushar is - 13488.pptxtushar is - 13488.pptx
tushar is - 13488.pptx
 
Himanshu IS 13487.pptx
Himanshu IS 13487.pptxHimanshu IS 13487.pptx
Himanshu IS 13487.pptx
 
CP SINGH IS-15410 new.pdf
CP SINGH IS-15410 new.pdfCP SINGH IS-15410 new.pdf
CP SINGH IS-15410 new.pdf
 
AMAN PPT 4985 Assignment-1.pptx
AMAN PPT 4985 Assignment-1.pptxAMAN PPT 4985 Assignment-1.pptx
AMAN PPT 4985 Assignment-1.pptx
 
ADITYA IS-4984.pptx
ADITYA IS-4984.pptxADITYA IS-4984.pptx
ADITYA IS-4984.pptx
 
Wave motion bsc
Wave motion bsc Wave motion bsc
Wave motion bsc
 
Moment of inertia (1)
Moment of inertia (1)Moment of inertia (1)
Moment of inertia (1)
 
Chemistry presentation
Chemistry presentationChemistry presentation
Chemistry presentation
 
Simple hormonic motion
Simple hormonic motionSimple hormonic motion
Simple hormonic motion
 
Chemistry presentation on xenon compounds
Chemistry presentation on xenon compoundsChemistry presentation on xenon compounds
Chemistry presentation on xenon compounds
 
Moment of inertia (1)
Moment of inertia (1)Moment of inertia (1)
Moment of inertia (1)
 

Recently uploaded

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 

DISHA PATEL COMPUTER VIRUS PPT.pptx

  • 1. Presented By- DISHA PATEL CLASS – VII-D ROLL NO.- 13 SUBMITTED TO- MRS. khusHboO sahai A PRESENTATION ON COMPUTER VIRUS
  • 2. Introduction How Does It Spread Symptoms Prevention Types Of Computer Virus Boot Sector Virus Program File Virus Multipartite Virus Macro Virus Malware Worm Spyware Trojen Horse Conclusion
  • 3. Computer viruses are a type of software program that, like a biological virus, reproduces and spreads itself. Full Form: Vital Information Resource Under Seizes. Some virus may display only a message on the screen, others may slow down the Pc. They can also erase files or even format your floppy or hard disk and crash the system. Creeper Virus: The first detected on APRANET in the early 1970's. Popular Viruses: Jerusalem or Israeli Virus, Brain or Pakistani Virus, April First, Ping Pong or Bouncing Ball, Stoned, Dark Avengers, Love bug, Ransomware.
  • 4.  Computer viruses spread by attaching themselves to other computer program file.  When you exchange a file or pen drive with a virus, the virus spreads from one computer to the another.  Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC.
  • 5. Letters looks like they are falling to the bottom of the screen. The computer system becomes slow. The size of available free memory reduces. The hard disk runs out of space. The computer does not boot. Fail to print correctly. Restarts itself often.
  • 6. Upload and use antivirus software.  Be aware of the e- mails and attachments you open.  Check for updates on antivirus software regularly.  Make sure antivirus software is installed correctly. On the computer, turn on the firewall. Keep the computer operating system up to date.
  • 7. Boot Sector Virus Program File Virus Multipartite Virus Macro Virus
  • 8. Infects the boot or Master Boot record (MBR), contains info about the drive and the bootstrap loader of diskettes and hard drives through the sharing of infected disks and pirated software applications. Once your hard drive is infected all diskettes that you use in your computer will be infected.
  • 9. Becomes active when the program file (usually with extensions BIN, COM, EXE, OVL, DRV) carrying the virus is opened. It then makes copies of itself and will infect other programs on the computer.
  • 10. Hybrid of a Boot Sector and Program viruses. It infects program files and when the infected program is active it will affect the boot record.
  • 11. Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel. Once it gets in to your computer, every document you produce will become infected. Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed.
  • 12. Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
  • 13. A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. A computer worm duplicates itself to spread to uninfected computers.
  • 14. Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  • 15. Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.
  • 16. Computer viruses and worms can so easily be placed into your work station so you must be careful when going on the internet, opening emails from unknown users, make sure you have some kind of anti-virus software and always get updates so that you aren't helping to spread viruses and worms Other people as well as harming yourself and your pocket.