Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Viruses - School Essays

Computer Viruses


A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying of corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102)b.
Three types of viruses are a boot sector virus, file virus, and Trojan horse virus. A boot sector virus infects the. When the infected boot program executes, the virus is ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no more memory of disk space remains.
To find , anti-virus programs have been developed. Besides detecting viruses, anti-virus programs also have utilities to remove or repair infected programs and files. Some damaged files cannot be repaired and must be replaced with uninfected archive files. The table below outlines some techniques used to protect computer systems.
Table
Techniques for virus Protection and System Archive
Using Virus Protection Software Backing Up Your System
Install virus protection software on every computer system Develop a regular plan for copying and storing important data and program files.
Before use, scan every floppy disk with a virus scan program to check for ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Computer Viruses. (2008, December 24). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Computer-Viruses/95127
"Computer Viruses." Essayworld.com. Essayworld.com, 24 Dec. 2008. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Computer-Viruses/95127>
"Computer Viruses." Essayworld.com. December 24, 2008. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses/95127.
"Computer Viruses." Essayworld.com. December 24, 2008. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses/95127.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 12/24/2008 12:25:26 PM
Category: Science & Nature
Type: Premium Paper
Words: 454
Pages: 2

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Viruses: Past, Present...
» Are "Good" Computer Viruses Sti...
» Computer Viruses
» Polymorphic & Cloning Computer ...
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved