Running head: COMPUTER VIRUS 1 COMPUTER VIRUS 2 Computer viruses, Spread and Prevention Computer viruses The computer viruses are program files that are capable of reproducing its special code. It also attaches the code to the files without the user’s knowledge. Since the code is attached, the newly amended codes run as the rest of the programs run. Also, these programs search out for other programs to which they are not attached. Consequently, the virus attacks files that are saved on the computer’s hard disk as well as the external devices. For example, the virus attacks a flash disk once inserted into the computer. Interestingly, these computer viruses are a direct result of a person that intentionally designs them (Ferbrache, 2012). They are tested to ensure that they produce the desired effects. In summary, a computer virus is a program file that attached itself and spread through other computer programs hence damages their functions, but can be prevented. Characteristics of Computer Viruses The virus replicates itself once it is created and distributed. It also attaches itself to program files as it spreads whenever the program is executed. The infected files then repeat the duplication process when they are run. On the other hand, there are other programs that are created only to spread the virus when specific commands are made hence activate the spread. As a result, these viruses are known to capture a portion of the system function in a computer for them to distinguish their existence (Yang & Yang, 2012). Prevention of computer viruses Prevention of the computer viruses is significant because they interfere with the normal functions of the computer programs. A computer user needs to protect the machine and maintain data security. Usually, an individual can avoid the viruses by avoiding the high-risk areas of the internet. Also, one can install an antivirus that detects the virus and prevents it from attaching itself to the programs (Liang & Chen, 2012). Additionally, an individual can have backup data that will not be affected. Consequently, the programs and files can be reinstalled once the virus is removed. References Ferbrache, D. (2012). A pathology of computer viruses. Springer Science & Business Media. Liang, Y. C., & Chen, Y. F. (2012). U.S. Patent No. 8,291,498. Washington, DC: U.S. Patent and Trademark Office. Yang, L. X., & Yang, X. (2012). The spread of computer viruses under the influence of removable storage devices. Applied Mathematics and Computation, 219(8), 3914-3922. ...