SlideShare a Scribd company logo
BY:G.DHANUSHIA
DEFINATION OF COMPUTER VIRUS
 A computer virus is a sort of malware that attaches itself to another
program and can replicate and propagate once it has been installed on a
user’s computer. When a computer changes the way in which it should
work normally, it is said to be infected by a virus. This virus may spread
from one computer to another.
TYPES OF COMPUTER VIRUS
BOOT SECTOR VIRUS
 This virus infects the boot sector of the
computer and runs every time the
computer boots and before the
operating system loads. Floppy
disks and other bootable media become
infected. They are sometimes referred to
as memory viruses because they do not
infect the file system.
ENCRYPTEDVIRUS
 To avoid detection by
antivirus software, this
type of virus is encrypted.
There’s also a decryption
algorithm included. As a
result, before running, the
virus decrypts.
FILE VIRUS
 Infects the system by appending
itself to the end of a file. It
changes the start of a program
such that the control jumps to its
code.
EMAIL-VIRUS
 They are comprised of malicious code
that is propagated through email
messages and can be activated when a
user clicks on a link in an email
message, opens an email attachment, or
interacts in any manner with the infected
email message.
WHAT DOES A COMPUTER VIRUS DO?
 A virus can harm or destroy data, slow down system resources, and log
keystrokes, among other things.
 A virus has the ability to have unexpected or harmful outcomes during this
procedure, such as destroying system software by corrupting data.
 Some computer viruses are designed to damage your computer by destroying
files, corrupting applications, or reformatting the hard drive. Even less dangerous
computer infections can have a substantial impact on your system’s performance,
eating up RAM and triggering frequent crashes. Other viruses may just clone
themselves or flood a network with traffic, rendering all internet activity difficult.
COMMON SIGNS OF COMPUTER
VIRUES
 Opening of Pop-up window frequently. Pop-ups may entice you
to visit odd locations. They will take you to a page to download
any antivirus (which is actually not an antivirus), or other harmful
software.
 Slowing down of system without any reason.
 Updated homepage. For example, the homepage is replaced by
a website and you would not be able to undo that replacement.
 Identifying that your files are corrupted.
 Unknown change in the password that does not let you login.
HOW TO REMOVE COMPUTER VIRUSES
To get rid of a computer infection, you
have two options:
• Do-it-yourself manual approach
• Seek the assistance of a reliable
antivirus product
.
ANTIVIRUS
 Antivirus software is a program that searches for, detects, prevents,
and removes software infections that can harm your computer.
 Antivirus can also detect and remove other dangerous software
such as worms, adware, and other dangers.
 This software is intended to be used as a preventative measure
against cyber dangers, keeping them from entering your computer
and causing problems.
COMPUTER VIRUS.pptx

More Related Content

Similar to COMPUTER VIRUS.pptx

Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
COMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdfCOMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdf
SaifMallick1
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Virus
VirusVirus
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
sonajidongre
 
Computer virus
Computer virusComputer virus
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
aaberra
 
Viruses
VirusesViruses
Viruses
Shahidaffridi
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 

Similar to COMPUTER VIRUS.pptx (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdfCOMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdf
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus
VirusVirus
Virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Viruses
VirusesViruses
Viruses
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

COMPUTER VIRUS.pptx

  • 2. DEFINATION OF COMPUTER VIRUS  A computer virus is a sort of malware that attaches itself to another program and can replicate and propagate once it has been installed on a user’s computer. When a computer changes the way in which it should work normally, it is said to be infected by a virus. This virus may spread from one computer to another.
  • 4. BOOT SECTOR VIRUS  This virus infects the boot sector of the computer and runs every time the computer boots and before the operating system loads. Floppy disks and other bootable media become infected. They are sometimes referred to as memory viruses because they do not infect the file system.
  • 5. ENCRYPTEDVIRUS  To avoid detection by antivirus software, this type of virus is encrypted. There’s also a decryption algorithm included. As a result, before running, the virus decrypts.
  • 6. FILE VIRUS  Infects the system by appending itself to the end of a file. It changes the start of a program such that the control jumps to its code.
  • 7. EMAIL-VIRUS  They are comprised of malicious code that is propagated through email messages and can be activated when a user clicks on a link in an email message, opens an email attachment, or interacts in any manner with the infected email message.
  • 8. WHAT DOES A COMPUTER VIRUS DO?  A virus can harm or destroy data, slow down system resources, and log keystrokes, among other things.  A virus has the ability to have unexpected or harmful outcomes during this procedure, such as destroying system software by corrupting data.  Some computer viruses are designed to damage your computer by destroying files, corrupting applications, or reformatting the hard drive. Even less dangerous computer infections can have a substantial impact on your system’s performance, eating up RAM and triggering frequent crashes. Other viruses may just clone themselves or flood a network with traffic, rendering all internet activity difficult.
  • 9. COMMON SIGNS OF COMPUTER VIRUES  Opening of Pop-up window frequently. Pop-ups may entice you to visit odd locations. They will take you to a page to download any antivirus (which is actually not an antivirus), or other harmful software.  Slowing down of system without any reason.  Updated homepage. For example, the homepage is replaced by a website and you would not be able to undo that replacement.  Identifying that your files are corrupted.  Unknown change in the password that does not let you login.
  • 10. HOW TO REMOVE COMPUTER VIRUSES To get rid of a computer infection, you have two options: • Do-it-yourself manual approach • Seek the assistance of a reliable antivirus product .
  • 11. ANTIVIRUS  Antivirus software is a program that searches for, detects, prevents, and removes software infections that can harm your computer.  Antivirus can also detect and remove other dangerous software such as worms, adware, and other dangers.  This software is intended to be used as a preventative measure against cyber dangers, keeping them from entering your computer and causing problems.