SlideShare a Scribd company logo
BY: Prabesh Shrestha
 It is the program which infects and
potentially damage the files in the computer
that receives it.
 It replicates and spreads by attaching itself
to other programs.
 A simple virus can make a copy of itself over
and over again.
 To take control of a computer and use it for
specific tasks
 To steal sensitive information (credit card
numbers, passwords, personal details, data
etc.)
 To prove that it can be done, to prove ones
skill
 For revenge purposes
 To cripple a computer or network
 For fun
 To earn fast money using malware
 From infected email attachments
 Downloading infected program from the
internet
 Using infected pen drives, CD, DVD etc.
 Transferring infected program over the
network and running it.
 Using pirated and illegal programs and
installing it into the computer
 Not having any updated antivirus programs to
control the virus infection
 Applications take longer time to load or may not
work at all
 Getting unusual error messages like Write Protect
Error
 Computer gets slow, freezes and crash some times.
 Important files or folders get changed or deleted
for no reason
 File size changes
 An increase in the number of files on the system
when nothing has been added
 Reformatting the hard disk
 Strange movements or patterns are seen on the
computer screen
 Use software from original CD or DVD.
 Do not use any pirated software as they may
contain virus.
 Use updated antivirus program.
 Always scan the downloaded files before
using them.
 Scan e-mail attachments before executing
them
 Do not use the removable disk such as pen
drives, floppy before scanning for virus
 Do not open any unknown and suspicious
websites or links.
1) Boot Sector Virus
 It infects the first sector i.e. boot sector of the
hard disk or floppy disk.
 It can also infect MBR (Master Boot Record)
 It changes the instructions stored in the boot
sector
 It prevents the computer to turn on
 It works when we turn on or restart the
computer
 Eg: Disk Killer, Michelangelo, Stoned, Bouncing
Ball
2) File Infecting Virus
 It infects the executable files having .exe,
.com, .drv, .sys, .ovl, .dll as extension name.
 It changes the contents of executable files.
 It replicates itself and infects files on the disk.
 It is spread by removable disks, through
network etc.
 It is easy to be detected because it changes the
size of the file.
 Eg: Friday the 13th, Enigma, Nemesis, Cascade
etc.
 It is a program designed to detect and
remove viruses from the computer system.
 It scans hard disk, removable disks, CD, DVD
etc.
 It needs to be updated regularly or from time
to time to ensure the smooth running of the
computer system.
 Eg: Norton antivirus, AVG, Kaspersky, Avast,
Avira, NOD32, Panda etc.
 It is a program that hides its purpose — it
claims to do one thing but really does
another
 It contains malicious or harmful codes which
can control and cause damage such as ruining
File Allocation Table(FAT) on hard disk.
 It is a malicious program which gets
transmitted by computer networks.
 Once it is installed it generates additional
email messages containing copies of the
worm.

More Related Content

What's hot

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
sohail awan
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
Prasad Athukorala
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
sasikumr sagabala
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Computer virus
Computer virusComputer virus
Computer virus
SanthiNivas
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
BESOR ACADEMY
 
Chapter 1
Chapter 1Chapter 1
Chapter 1lopjuan
 

What's hot (20)

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Virus
VirusVirus
Virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Computer virus
Computer virusComputer virus
Computer virus
 
541networking
541networking541networking
541networking
 
541networking
541networking541networking
541networking
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Similar to Computer viruses

Computer viruses
Computer virusesComputer viruses
Computer viruses
nkosana cusson ngwenya
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Viruses
VirusesViruses
Viruses
Shahidaffridi
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
AkshayIngole17
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Harmful software
Harmful softwareHarmful software
Harmful software
BijoKG2
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Binisha.pptx
Binisha.pptxBinisha.pptx
Binisha.pptx
SuvamMaharjan1
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
Jay Shah
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
viruses
virusesviruses
viruses
khadija habib
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Computer virus
Computer virusComputer virus
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 

Similar to Computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Viruses
VirusesViruses
Viruses
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Binisha.pptx
Binisha.pptxBinisha.pptx
Binisha.pptx
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computervirus
Computervirus Computervirus
Computervirus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus project
Virus projectVirus project
Virus project
 

More from Prabesh Shrestha

Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
Prabesh Shrestha
 
Types of computers
Types of computersTypes of computers
Types of computers
Prabesh Shrestha
 
Business law
Business lawBusiness law
Business law
Prabesh Shrestha
 
nature and importance of law of contract
nature and importance of law of contractnature and importance of law of contract
nature and importance of law of contract
Prabesh Shrestha
 
The shapes of computer today
The shapes of computer todayThe shapes of computer today
The shapes of computer today
Prabesh Shrestha
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Prabesh Shrestha
 
Email
EmailEmail
Generation of computers
Generation of computersGeneration of computers
Generation of computers
Prabesh Shrestha
 

More from Prabesh Shrestha (8)

Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Business law
Business lawBusiness law
Business law
 
nature and importance of law of contract
nature and importance of law of contractnature and importance of law of contract
nature and importance of law of contract
 
The shapes of computer today
The shapes of computer todayThe shapes of computer today
The shapes of computer today
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Email
EmailEmail
Email
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

Computer viruses

  • 2.
  • 3.  It is the program which infects and potentially damage the files in the computer that receives it.  It replicates and spreads by attaching itself to other programs.  A simple virus can make a copy of itself over and over again.
  • 4.  To take control of a computer and use it for specific tasks  To steal sensitive information (credit card numbers, passwords, personal details, data etc.)  To prove that it can be done, to prove ones skill  For revenge purposes  To cripple a computer or network  For fun  To earn fast money using malware
  • 5.  From infected email attachments  Downloading infected program from the internet  Using infected pen drives, CD, DVD etc.  Transferring infected program over the network and running it.  Using pirated and illegal programs and installing it into the computer  Not having any updated antivirus programs to control the virus infection
  • 6.  Applications take longer time to load or may not work at all  Getting unusual error messages like Write Protect Error  Computer gets slow, freezes and crash some times.  Important files or folders get changed or deleted for no reason  File size changes  An increase in the number of files on the system when nothing has been added  Reformatting the hard disk  Strange movements or patterns are seen on the computer screen
  • 7.  Use software from original CD or DVD.  Do not use any pirated software as they may contain virus.  Use updated antivirus program.  Always scan the downloaded files before using them.  Scan e-mail attachments before executing them  Do not use the removable disk such as pen drives, floppy before scanning for virus  Do not open any unknown and suspicious websites or links.
  • 8. 1) Boot Sector Virus  It infects the first sector i.e. boot sector of the hard disk or floppy disk.  It can also infect MBR (Master Boot Record)  It changes the instructions stored in the boot sector  It prevents the computer to turn on  It works when we turn on or restart the computer  Eg: Disk Killer, Michelangelo, Stoned, Bouncing Ball
  • 9. 2) File Infecting Virus  It infects the executable files having .exe, .com, .drv, .sys, .ovl, .dll as extension name.  It changes the contents of executable files.  It replicates itself and infects files on the disk.  It is spread by removable disks, through network etc.  It is easy to be detected because it changes the size of the file.  Eg: Friday the 13th, Enigma, Nemesis, Cascade etc.
  • 10.  It is a program designed to detect and remove viruses from the computer system.  It scans hard disk, removable disks, CD, DVD etc.  It needs to be updated regularly or from time to time to ensure the smooth running of the computer system.  Eg: Norton antivirus, AVG, Kaspersky, Avast, Avira, NOD32, Panda etc.
  • 11.  It is a program that hides its purpose — it claims to do one thing but really does another  It contains malicious or harmful codes which can control and cause damage such as ruining File Allocation Table(FAT) on hard disk.
  • 12.
  • 13.  It is a malicious program which gets transmitted by computer networks.  Once it is installed it generates additional email messages containing copies of the worm.