SlideShare a Scribd company logo
TOPIC: COMPUTER VIRUSES



Have you ever been working in your computer and then you open an unknown file you find
in the web and suddenly appear a message that tells you that your PC is in danger? Do you
know what computer viruses are and how they spread?


WHAT ARE COMPUTER VIRUSES?

                          A virus is a malware (a malicious software or badware) that has
                          the objective of damaging the PC without the permission of the
                          computer user.


                          Viruses usually replace the files that can be carried out for the
                                                       ones that are infected. They take the
                            function of other files that           are already saved in the
                            computer, but there are also other viruses that are characterized
                            because they just annoy.


Some of the characteristics of the viruses are:
*They produce the loss of productivity of the PC, it becomes slow
*They produce cuts in the information systems
*Damage of data and files
*They are able to spread by replicas


                               HOW VIRUSES SPREAD?
                               There are two ways in which your PC can get viruses; they
                               are:
                               1-The user accepts or carries out the installation of the virus
                               without a warning message.
                               2-The virus acts by replicas through the net.
It can be mentioned that there are some ways in which the PC can be infected by the viruses
when the user is interacting or working on the computer; some of those are:
   •   Through messages that are carried out in programs
   •   Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS
       PROGRAM AND YOU’LL WIN A PRIZE”
   •   When you use diskettes, CD’s or the USB and the files that those hardwares contain
       is infected.
   •   When you install software and you ignore if it has a virus.




                                         TYPES OF VIRUSES


                                         There are a lot of types of viruses; they vary
                                         according to the way they spread, their function,
                                         and the way in which they carry out in the
                                         computer or in the way they alter the activity of it.




Some of the most common viruses are:
   •   The Trojan or the horse Trojan: They steal information and also alter the
       performance of your PC. There are extreme cases in which other users can control
       the system of your PC because of this type of virus.


   •   Worms: They are able to duplicate themselves by using the automatic parts of the
       operation system of the PC that are not visible for the users.


   •   Logic bombs: They are programs that are activated with certain files.
HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES?
There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE
AND PASSIVE METHODS.


Active method:
Antivirus: they are programs that can detect,
eliminate and even stop the spread of viruses.
The antivirus control de system of the PC and
they notified the user when a file or program is
possibly infected.




Passive method:


   •   Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be
       infected.
   •   Do not install pirated softwares.
   •   Do not open messages or emails that are from an unknown address.
   •   Do not open files without knowing the type of file.

More Related Content

What's hot

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Computer virus
Computer virusComputer virus
Computer virus
Muhammad Umar Farooq
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
Arnab Singha
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
YouQue ™
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
aagmansaini
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
Nitish Xavier Tirkey
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer viruses
Computer virusesComputer viruses
Computer viruses
PRANJAL SAIKIA
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
Rohit Kashyap
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
SWAMY NAYAK
 
Virus part2
Virus part2Virus part2
Virus part2
Ajay Banyal
 

What's hot (20)

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Virus part2
Virus part2Virus part2
Virus part2
 

Viewers also liked

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangayClarissa Sulit
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
jmori1
 
Manal p.
Manal p.Manal p.
Manal p.
manaloza
 
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
futureagricultures
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?
Dinar Ibragimov
 
ボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討についてボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討について
長野市議会議員小泉一真
 
Wellbeing 2011 Fact Sheet English
Wellbeing 2011  Fact  Sheet  EnglishWellbeing 2011  Fact  Sheet  English
Wellbeing 2011 Fact Sheet English
Cheryl Deguara
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romany
MrsPrentice
 
Rde c words from visitors trip advisor comments
Rde c words from visitors   trip advisor commentsRde c words from visitors   trip advisor comments
Cлайды
CлайдыCлайды
Cлайды
Dinar Ibragimov
 
Corespring
CorespringCorespring
Corespring
mrinalbagaria
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from context
Les Davy
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Robby Firmansyah
 
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
giopersico
 
Acrocanthasaurus
AcrocanthasaurusAcrocanthasaurus
Acrocanthasaurus
lesleymccardle
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
Carlos Javier Beltran Martinez
 
use WACS;
use WACS;use WACS;
use WACS;
Eikichi Gotoh
 

Viewers also liked (20)

Pangunahing problema sa aking barangay
Pangunahing problema sa aking barangayPangunahing problema sa aking barangay
Pangunahing problema sa aking barangay
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
 
อติมา อุ่นจิตร
อติมา  อุ่นจิตรอติมา  อุ่นจิตร
อติมา อุ่นจิตร
 
Manal p.
Manal p.Manal p.
Manal p.
 
บทที่ 11
บทที่ 11บทที่ 11
บทที่ 11
 
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
The vulnerability-wealth conundrum in pastoral areas: what role for social pr...
 
Что делать с деструкторами?
Что делать с деструкторами?Что делать с деструкторами?
Что делать с деструкторами?
 
ボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討についてボブスレー・リュージュパークのあり方の検討について
ボブスレー・リュージュパークのあり方の検討について
 
Wellbeing 2011 Fact Sheet English
Wellbeing 2011  Fact  Sheet  EnglishWellbeing 2011  Fact  Sheet  English
Wellbeing 2011 Fact Sheet English
 
Brand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romanyBrand New Inanimate Alice by Katie and Daisy and romany
Brand New Inanimate Alice by Katie and Daisy and romany
 
Rde c words from visitors trip advisor comments
Rde c words from visitors   trip advisor commentsRde c words from visitors   trip advisor comments
Rde c words from visitors trip advisor comments
 
Cлайды
CлайдыCлайды
Cлайды
 
S t o r y b o a r d
S t o r y b o a r dS t o r y b o a r d
S t o r y b o a r d
 
Corespring
CorespringCorespring
Corespring
 
Understanding vocabulary from context
Understanding vocabulary from contextUnderstanding vocabulary from context
Understanding vocabulary from context
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
Microsoft Excel and Financial Modeling - Global Survey Results (July 2011)
 
Acrocanthasaurus
AcrocanthasaurusAcrocanthasaurus
Acrocanthasaurus
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
 
use WACS;
use WACS;use WACS;
use WACS;
 

Similar to Proyecto7

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
wargames12
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
glainAE
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer virus
Computer virusComputer virus
Computer virus
Sammer Khizer
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
Apoorva812677
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
EimerejDlcrz
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 
Computer virus
Computer virusComputer virus
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 

Similar to Proyecto7 (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Proyecto7

  • 1. TOPIC: COMPUTER VIRUSES Have you ever been working in your computer and then you open an unknown file you find in the web and suddenly appear a message that tells you that your PC is in danger? Do you know what computer viruses are and how they spread? WHAT ARE COMPUTER VIRUSES? A virus is a malware (a malicious software or badware) that has the objective of damaging the PC without the permission of the computer user. Viruses usually replace the files that can be carried out for the ones that are infected. They take the function of other files that are already saved in the computer, but there are also other viruses that are characterized because they just annoy. Some of the characteristics of the viruses are: *They produce the loss of productivity of the PC, it becomes slow *They produce cuts in the information systems *Damage of data and files *They are able to spread by replicas HOW VIRUSES SPREAD? There are two ways in which your PC can get viruses; they are: 1-The user accepts or carries out the installation of the virus without a warning message. 2-The virus acts by replicas through the net.
  • 2. It can be mentioned that there are some ways in which the PC can be infected by the viruses when the user is interacting or working on the computer; some of those are: • Through messages that are carried out in programs • Social messages like the ones that tell you “CLICK ON THIS; CARRY OUT THIS PROGRAM AND YOU’LL WIN A PRIZE” • When you use diskettes, CD’s or the USB and the files that those hardwares contain is infected. • When you install software and you ignore if it has a virus. TYPES OF VIRUSES There are a lot of types of viruses; they vary according to the way they spread, their function, and the way in which they carry out in the computer or in the way they alter the activity of it. Some of the most common viruses are: • The Trojan or the horse Trojan: They steal information and also alter the performance of your PC. There are extreme cases in which other users can control the system of your PC because of this type of virus. • Worms: They are able to duplicate themselves by using the automatic parts of the operation system of the PC that are not visible for the users. • Logic bombs: They are programs that are activated with certain files.
  • 3. HOW CAN WE AVOID OR ELIMINATE THESE VIRUSES? There are methods to be used aimed to the risk of getting viruses; they are called ACTIVE AND PASSIVE METHODS. Active method: Antivirus: they are programs that can detect, eliminate and even stop the spread of viruses. The antivirus control de system of the PC and they notified the user when a file or program is possibly infected. Passive method: • Avoiding using hardwares like diskettes, CD’s or USB’s that you consider can be infected. • Do not install pirated softwares. • Do not open messages or emails that are from an unknown address. • Do not open files without knowing the type of file.