SlideShare a Scribd company logo
describe the differences and similarities between viruses, worms, and Trojan horses. Provide an
example of at least one of these and describe that damage that can be done when a person or
corporation is infected.
Solution
Lets me make it clear actually what these are first and then we move to the diffrences and
similarities
A computer virus connects itself to a program or record empowering it to spread starting with
one PC then onto the next, leaving contamination as it travels. Like a human infection, a PC
virus can extend in seriousness: some may bring about just somewhat irritating impacts while
others can harm your hardware, programming or records. All viruses are joined to an executable
record, which implies the infection may exist on your PC yet it really can't contaminate your PC
unless you run or open the pernicious program.
A worm is like an virus by outline and is thought to be a sub-class of an infection. Worms spread
from PC to PC, yet not at all like an virus, it has the capacity to go with no human activity. A
worm exploits document or data transport includes on your framework, which is the thing that
permits it to travel unaided.
A Trojan Horse is loaded with as much cunning as the fanciful Trojan Horse it was named after.
The Trojan Horse, at first look will seem, by all accounts, to be valuable software yet will really
do harm once introduced or keep running on your PC. Those on the less than desirable end of a
Trojan Horse are normally deceived into opening them since they give off an impression of
being getting true blue programming or documents from a honest to goodness source.
Now I will Focus on the differences between Viruses, Worms and Torjan Horses
On the basis of its mode of spread
A virus attach itself to an executable file and then require a human to propogate, a worm does
not require a human action to spread,torjan horse does not replicates itself and require human
input to take into action.
similarity is that they all are malicious programs that can cause damage to your computer.
Examples:-
VIRUSES
WORMS
Torjan

More Related Content

Similar to describe the differences and similarities between viruses, worms, an.pdf

Virus
VirusVirus
Virus
dddaou
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Viruses
VirusesViruses
Information security
Information securityInformation security
Information security
JAMEEL AHMED KHOSO
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
Atuk4
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
Type of Malware
Type of MalwareType of Malware
Type of Malware
SOCRadar Inc
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
itsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 

Similar to describe the differences and similarities between viruses, worms, an.pdf (20)

virus
  virus  virus
virus
 
Virus
VirusVirus
Virus
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Viruses
VirusesViruses
Viruses
 
Information security
Information securityInformation security
Information security
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Type of Malware
Type of MalwareType of Malware
Type of Malware
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

More from mdameer02

II. Please provide complete correct detailed solution. Thank you. Co.pdf
II. Please provide complete correct detailed solution. Thank you. Co.pdfII. Please provide complete correct detailed solution. Thank you. Co.pdf
II. Please provide complete correct detailed solution. Thank you. Co.pdf
mdameer02
 
In a Windows 8 file system there is a file named direct.awk in a fol.pdf
In a Windows 8 file system there is a file named direct.awk in a fol.pdfIn a Windows 8 file system there is a file named direct.awk in a fol.pdf
In a Windows 8 file system there is a file named direct.awk in a fol.pdf
mdameer02
 
If using an ANOVA Single factor and the alpha is set at .05 and the.pdf
If using an ANOVA Single factor and the alpha is set at .05 and the.pdfIf using an ANOVA Single factor and the alpha is set at .05 and the.pdf
If using an ANOVA Single factor and the alpha is set at .05 and the.pdf
mdameer02
 
I need help please with these 2 assignments. of ul Uus Oll ook.pdf
I need help please with these 2 assignments. of ul Uus Oll ook.pdfI need help please with these 2 assignments. of ul Uus Oll ook.pdf
I need help please with these 2 assignments. of ul Uus Oll ook.pdf
mdameer02
 
How is water transported across the membrane What are the two types.pdf
How is water transported across the membrane  What are the two types.pdfHow is water transported across the membrane  What are the two types.pdf
How is water transported across the membrane What are the two types.pdf
mdameer02
 
Gradebook ignment FULL Question 1 Which of the following types of ent.pdf
Gradebook ignment FULL Question 1 Which of the following types of ent.pdfGradebook ignment FULL Question 1 Which of the following types of ent.pdf
Gradebook ignment FULL Question 1 Which of the following types of ent.pdf
mdameer02
 
Explain the DuPont identity. How is it used in finance Locate the f.pdf
Explain the DuPont identity. How is it used in finance Locate the f.pdfExplain the DuPont identity. How is it used in finance Locate the f.pdf
Explain the DuPont identity. How is it used in finance Locate the f.pdf
mdameer02
 
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdfFiles to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
mdameer02
 
explain why the jovian planet atmospheres are called primitive atmos.pdf
explain why the jovian planet atmospheres are called primitive atmos.pdfexplain why the jovian planet atmospheres are called primitive atmos.pdf
explain why the jovian planet atmospheres are called primitive atmos.pdf
mdameer02
 
During digestion, in the intestinal lumen certain glycerols, FFA an.pdf
During digestion, in the intestinal lumen certain glycerols, FFA an.pdfDuring digestion, in the intestinal lumen certain glycerols, FFA an.pdf
During digestion, in the intestinal lumen certain glycerols, FFA an.pdf
mdameer02
 
Describe the structures and functions associated with the water-vascu.pdf
Describe the structures and functions associated with the water-vascu.pdfDescribe the structures and functions associated with the water-vascu.pdf
Describe the structures and functions associated with the water-vascu.pdf
mdameer02
 
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdf
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdfConsidering the atoms bonded and the shape of an H_2O molecule, is th.pdf
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdf
mdameer02
 
A window has the rectangle surmounted by a semi circle the total per.pdf
A window has the rectangle surmounted by a semi circle the total per.pdfA window has the rectangle surmounted by a semi circle the total per.pdf
A window has the rectangle surmounted by a semi circle the total per.pdf
mdameer02
 
Can you identify how energy flows through an ecosystemCan you i.pdf
Can you identify how energy flows through an ecosystemCan you i.pdfCan you identify how energy flows through an ecosystemCan you i.pdf
Can you identify how energy flows through an ecosystemCan you i.pdf
mdameer02
 
You must use the full name, no abbreviations. Name the dynamic found.pdf
You must use the full name, no abbreviations.  Name the dynamic found.pdfYou must use the full name, no abbreviations.  Name the dynamic found.pdf
You must use the full name, no abbreviations. Name the dynamic found.pdf
mdameer02
 
You are burning the latest song you bought on ITunes to a disk. The .pdf
You are burning the latest song you bought on ITunes to a disk. The .pdfYou are burning the latest song you bought on ITunes to a disk. The .pdf
You are burning the latest song you bought on ITunes to a disk. The .pdf
mdameer02
 
Write a scientific research paper that investigates the properties of.pdf
Write a scientific research paper that investigates the properties of.pdfWrite a scientific research paper that investigates the properties of.pdf
Write a scientific research paper that investigates the properties of.pdf
mdameer02
 
Write a function that multiplies each element in the array myA.pdf
Write a function that multiplies each element in the array myA.pdfWrite a function that multiplies each element in the array myA.pdf
Write a function that multiplies each element in the array myA.pdf
mdameer02
 
Which of the following is NOT a common feature of monosaccharidesA..pdf
Which of the following is NOT a common feature of monosaccharidesA..pdfWhich of the following is NOT a common feature of monosaccharidesA..pdf
Which of the following is NOT a common feature of monosaccharidesA..pdf
mdameer02
 
Who are the owners of a cor[poration,and how is their ownership repr.pdf
Who are the owners of a cor[poration,and how is their ownership repr.pdfWho are the owners of a cor[poration,and how is their ownership repr.pdf
Who are the owners of a cor[poration,and how is their ownership repr.pdf
mdameer02
 

More from mdameer02 (20)

II. Please provide complete correct detailed solution. Thank you. Co.pdf
II. Please provide complete correct detailed solution. Thank you. Co.pdfII. Please provide complete correct detailed solution. Thank you. Co.pdf
II. Please provide complete correct detailed solution. Thank you. Co.pdf
 
In a Windows 8 file system there is a file named direct.awk in a fol.pdf
In a Windows 8 file system there is a file named direct.awk in a fol.pdfIn a Windows 8 file system there is a file named direct.awk in a fol.pdf
In a Windows 8 file system there is a file named direct.awk in a fol.pdf
 
If using an ANOVA Single factor and the alpha is set at .05 and the.pdf
If using an ANOVA Single factor and the alpha is set at .05 and the.pdfIf using an ANOVA Single factor and the alpha is set at .05 and the.pdf
If using an ANOVA Single factor and the alpha is set at .05 and the.pdf
 
I need help please with these 2 assignments. of ul Uus Oll ook.pdf
I need help please with these 2 assignments. of ul Uus Oll ook.pdfI need help please with these 2 assignments. of ul Uus Oll ook.pdf
I need help please with these 2 assignments. of ul Uus Oll ook.pdf
 
How is water transported across the membrane What are the two types.pdf
How is water transported across the membrane  What are the two types.pdfHow is water transported across the membrane  What are the two types.pdf
How is water transported across the membrane What are the two types.pdf
 
Gradebook ignment FULL Question 1 Which of the following types of ent.pdf
Gradebook ignment FULL Question 1 Which of the following types of ent.pdfGradebook ignment FULL Question 1 Which of the following types of ent.pdf
Gradebook ignment FULL Question 1 Which of the following types of ent.pdf
 
Explain the DuPont identity. How is it used in finance Locate the f.pdf
Explain the DuPont identity. How is it used in finance Locate the f.pdfExplain the DuPont identity. How is it used in finance Locate the f.pdf
Explain the DuPont identity. How is it used in finance Locate the f.pdf
 
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdfFiles to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
Files to Use httpwww.cse.msu.edu~cse231ProjectsProject05Red.pdf
 
explain why the jovian planet atmospheres are called primitive atmos.pdf
explain why the jovian planet atmospheres are called primitive atmos.pdfexplain why the jovian planet atmospheres are called primitive atmos.pdf
explain why the jovian planet atmospheres are called primitive atmos.pdf
 
During digestion, in the intestinal lumen certain glycerols, FFA an.pdf
During digestion, in the intestinal lumen certain glycerols, FFA an.pdfDuring digestion, in the intestinal lumen certain glycerols, FFA an.pdf
During digestion, in the intestinal lumen certain glycerols, FFA an.pdf
 
Describe the structures and functions associated with the water-vascu.pdf
Describe the structures and functions associated with the water-vascu.pdfDescribe the structures and functions associated with the water-vascu.pdf
Describe the structures and functions associated with the water-vascu.pdf
 
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdf
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdfConsidering the atoms bonded and the shape of an H_2O molecule, is th.pdf
Considering the atoms bonded and the shape of an H_2O molecule, is th.pdf
 
A window has the rectangle surmounted by a semi circle the total per.pdf
A window has the rectangle surmounted by a semi circle the total per.pdfA window has the rectangle surmounted by a semi circle the total per.pdf
A window has the rectangle surmounted by a semi circle the total per.pdf
 
Can you identify how energy flows through an ecosystemCan you i.pdf
Can you identify how energy flows through an ecosystemCan you i.pdfCan you identify how energy flows through an ecosystemCan you i.pdf
Can you identify how energy flows through an ecosystemCan you i.pdf
 
You must use the full name, no abbreviations. Name the dynamic found.pdf
You must use the full name, no abbreviations.  Name the dynamic found.pdfYou must use the full name, no abbreviations.  Name the dynamic found.pdf
You must use the full name, no abbreviations. Name the dynamic found.pdf
 
You are burning the latest song you bought on ITunes to a disk. The .pdf
You are burning the latest song you bought on ITunes to a disk. The .pdfYou are burning the latest song you bought on ITunes to a disk. The .pdf
You are burning the latest song you bought on ITunes to a disk. The .pdf
 
Write a scientific research paper that investigates the properties of.pdf
Write a scientific research paper that investigates the properties of.pdfWrite a scientific research paper that investigates the properties of.pdf
Write a scientific research paper that investigates the properties of.pdf
 
Write a function that multiplies each element in the array myA.pdf
Write a function that multiplies each element in the array myA.pdfWrite a function that multiplies each element in the array myA.pdf
Write a function that multiplies each element in the array myA.pdf
 
Which of the following is NOT a common feature of monosaccharidesA..pdf
Which of the following is NOT a common feature of monosaccharidesA..pdfWhich of the following is NOT a common feature of monosaccharidesA..pdf
Which of the following is NOT a common feature of monosaccharidesA..pdf
 
Who are the owners of a cor[poration,and how is their ownership repr.pdf
Who are the owners of a cor[poration,and how is their ownership repr.pdfWho are the owners of a cor[poration,and how is their ownership repr.pdf
Who are the owners of a cor[poration,and how is their ownership repr.pdf
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

describe the differences and similarities between viruses, worms, an.pdf

  • 1. describe the differences and similarities between viruses, worms, and Trojan horses. Provide an example of at least one of these and describe that damage that can be done when a person or corporation is infected. Solution Lets me make it clear actually what these are first and then we move to the diffrences and similarities A computer virus connects itself to a program or record empowering it to spread starting with one PC then onto the next, leaving contamination as it travels. Like a human infection, a PC virus can extend in seriousness: some may bring about just somewhat irritating impacts while others can harm your hardware, programming or records. All viruses are joined to an executable record, which implies the infection may exist on your PC yet it really can't contaminate your PC unless you run or open the pernicious program. A worm is like an virus by outline and is thought to be a sub-class of an infection. Worms spread from PC to PC, yet not at all like an virus, it has the capacity to go with no human activity. A worm exploits document or data transport includes on your framework, which is the thing that permits it to travel unaided. A Trojan Horse is loaded with as much cunning as the fanciful Trojan Horse it was named after. The Trojan Horse, at first look will seem, by all accounts, to be valuable software yet will really do harm once introduced or keep running on your PC. Those on the less than desirable end of a Trojan Horse are normally deceived into opening them since they give off an impression of being getting true blue programming or documents from a honest to goodness source. Now I will Focus on the differences between Viruses, Worms and Torjan Horses On the basis of its mode of spread A virus attach itself to an executable file and then require a human to propogate, a worm does not require a human action to spread,torjan horse does not replicates itself and require human input to take into action. similarity is that they all are malicious programs that can cause damage to your computer. Examples:- VIRUSES WORMS Torjan