SlideShare a Scribd company logo
1 of 9
Computer Virus
2015/02/01
Presented by: Shubham Kafle
Class:-8
Introduction on virus
 The destructive computer program that disrupts the normal or
proper functioning of computer.
 A malware program.
 Invented by a famous American scientist Frederick B. Cohen.
Types of virus
 Bootstrap:
 Infects the booting device of the computer.
 File infector virus:
 Overwrites the files which it infects.
 Multipartite virus:
 It is the combination of Boot sector virus and file infector virus. It is the most
dangerous virus.
 Macro virus:
 This virus affects documents so virus is also known as document virus.
 Script virus:
 It is a denied code which is also called as polymorphic virus.
What a virus can do?
Virus have lots of effects on computer. It can do lots of things
like:
 It can destroy the computer programming.
 It can make the computer slow.
 It can delete the computer file and folders.
 It can restart the computer frequently.
 It can make the computer crash.
 It can corrupt the files and folders of the computer.
 It can leak the data to other to other computer.
 It can also not let the antivirus to be installed in the computer.
What a virus cannot do?
There are many things which a computer virus cannot do.
 It cannot damage the computer hardware.
 It cannot harm to the harm to human beings.
 It cannot damage the protected files and folders.
 It cannot bring our lost files and folders from the computer.
 It cannot damage the antivirus software or any other
computer protecting software.
Symptoms of Virus
When there is virus in our computer then we notice some
changes in our computer which are the symptoms of virus. The
symptoms are:
 Computer runs slow than usual.
 The computer stop responding or it locks up frequently.
 The computer crashes and then it restarts every few minutes.
 Application on the computer do not work correctly.
 The file may get corrupted.
 Some times some files and folders may get lost.
Spreading of Virus
Virus are spreaded to earn money through selling antivirus in
large amount. It spreads by following ways:
 A virus is spread whenever an infected program is run
 Once a virus is copied on a computer it attaches to other
application of computer
 By using infected devices such as:-flash drivers then a virus
can enter to a computer
 By downloading from an authorized website can also bring
virus to the computer
Protection from Virus
To keep our computer protected from virus we should apply following
ways:
 Keep a strong antivirus
 Don’t insert any pen drives or any other flash drives unless it is
virus free.
 Avoid downloading any software in a unauthorized website or free
of cost.
 Scan and update antivirus time to time.
 Keep your antivirus in high/maximum security.
Thank You!!

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar to Computer virus

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Similar to Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus project
Virus projectVirus project
Virus project
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses
VirusesViruses
Viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
viruses
virusesviruses
viruses
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Sowmya
SowmyaSowmya
Sowmya
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Computer virus

  • 2. Introduction on virus  The destructive computer program that disrupts the normal or proper functioning of computer.  A malware program.  Invented by a famous American scientist Frederick B. Cohen.
  • 3. Types of virus  Bootstrap:  Infects the booting device of the computer.  File infector virus:  Overwrites the files which it infects.  Multipartite virus:  It is the combination of Boot sector virus and file infector virus. It is the most dangerous virus.  Macro virus:  This virus affects documents so virus is also known as document virus.  Script virus:  It is a denied code which is also called as polymorphic virus.
  • 4. What a virus can do? Virus have lots of effects on computer. It can do lots of things like:  It can destroy the computer programming.  It can make the computer slow.  It can delete the computer file and folders.  It can restart the computer frequently.  It can make the computer crash.  It can corrupt the files and folders of the computer.  It can leak the data to other to other computer.  It can also not let the antivirus to be installed in the computer.
  • 5. What a virus cannot do? There are many things which a computer virus cannot do.  It cannot damage the computer hardware.  It cannot harm to the harm to human beings.  It cannot damage the protected files and folders.  It cannot bring our lost files and folders from the computer.  It cannot damage the antivirus software or any other computer protecting software.
  • 6. Symptoms of Virus When there is virus in our computer then we notice some changes in our computer which are the symptoms of virus. The symptoms are:  Computer runs slow than usual.  The computer stop responding or it locks up frequently.  The computer crashes and then it restarts every few minutes.  Application on the computer do not work correctly.  The file may get corrupted.  Some times some files and folders may get lost.
  • 7. Spreading of Virus Virus are spreaded to earn money through selling antivirus in large amount. It spreads by following ways:  A virus is spread whenever an infected program is run  Once a virus is copied on a computer it attaches to other application of computer  By using infected devices such as:-flash drivers then a virus can enter to a computer  By downloading from an authorized website can also bring virus to the computer
  • 8. Protection from Virus To keep our computer protected from virus we should apply following ways:  Keep a strong antivirus  Don’t insert any pen drives or any other flash drives unless it is virus free.  Avoid downloading any software in a unauthorized website or free of cost.  Scan and update antivirus time to time.  Keep your antivirus in high/maximum security.