Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.

Similar presentations


Presentation on theme: "Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other."— Presentation transcript:

1 Computer Technology Part 5 Megan Rees ERMS 5/13

2  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other files  It can ◦ Corrupt files ◦ Destroy data ◦ Display irritating messages ◦ Corrupt computer systems Megan ReesERMS 5/13

3  Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading documents from the Internet.  Viruses attach themselves to files with.exe,.com, or.vbs filename extensions  When you open an infected file, the virus opens and waits to infect the next program you run or disk you use Megan ReesERMS 5/13

4  Viruses have the ability to lurk in a computer for days or months, quietly replicating themselves  You may not even know your computer has a virus, thus making it easier to spread the virus Megan ReesERMS 5/13

5  An event that activates a task often associated with a computer virus  Time Bomb ◦ Watches for the PC clock to reach a certain date to activate the virus  Example  Michelangelo virus  Damages files on March 6 the artist’s birthday  Logic Bomb ◦ Watches for a specific set of input to activate the virus Megan ReesERMS 5/13

6 Megan ReesERMS 5/13

7  Virus that attaches to an application program ◦ Example  Chernobyl  Notorious for overwriting a section of the hard disk, making it impossible to access data  Written by Chen Ging Hau of Taiwan in 1998. One of the most damaging viruses. Megan ReesERMS 5/13

8  Infects the system files that your computer uses every time it is turned on  Cause widespread damage and recurring problems ◦ Example  Stoned Virus  Every time you turn on your computer the virus is activated and infects any non-write-protected files including your hard disk  Created in 1987, written by a university student in Wellington, New Zealand. One of the very first viruses. Megan ReesERMS 5/13

9  Macro ◦ A miniature program that usually contains legitimate instructions to automate a document or task. Infects data files—chiefly files created in Word, Excel, Power Point, and even Access.  This virus infects a macro ◦ Example  Melissa Virus  Attaches itself to Microsoft Word documents  Codemas Virus  Attaches itself to Microsoft Excel spreadsheets Megan ReesERMS 5/13

10 Megan ReesERMS 5/13

11  Computer program that seems to perform one function while actually doing something else ◦ Different from a virus because it does not make copies of itself  Different tasks that can be affected ◦ Stealing passwords ◦ Deleting files Megan ReesERMS 5/13

12 Megan ReesERMS 5/13

13  Software program designed to enter a computer system usually through a network, through security holes and then replicate itself  Spreads from computer to computer Megan ReesERMS 5/13

14 Megan ReesERMS 5/13

15 Megan ReesERMS 5/13

16  Antivirus software ◦ Set of utility programs that looks for and eradicates a wide spectrum of problems, including viruses, Trojan horses, and worms ◦ Example  McAfee Virus Scan  Don’t open e-mails attachments that have strange names or are from people you don’t recognize Megan ReesERMS 5/13

17  Jeff has a disk he borrowed from a friend. He puts in the school computer lab and retrieves the data he needs. He turns off the computer and leaves, leaving his disk behind and forgetting all about it. The next morning, Molly comes to the lab and starts the same computer. The computer tries to start from the disk in drive A, and is unable to start, giving Molly an error message. Molly notices the strange disk and takes it out, then tries to start the computer again. But the computer will not start up even when Molly removes the disk. Megan ReesERMS 5/13

18  David is surfing the internet for some free games. He finds a really awesome game, and it’s FREE! He’s super excited! He downloads the game, ignoring the user agreement and just clicking “yes” without reading it. He plays the game for a while, but then he notices his computer is slowing down and isn’t working properly. There is a virus on his computer! I wonder where it came from? Megan ReesERMS 5/13

19  Delilah is at the University checking her email in the computer lab. She sees she has several emails and is going through them one by one. One of the emails has the subject line: ILOVEYOU. Wahoo! Someone is in love with her! It’s a love note! YES! Delilah opens the email eagerly. But there was nothing interesting in the email. Before she knows it, a copy of this same email has been sent to all the people in her address book. The next day, the computer lab is closed because it and all the other computers on the network have been infected. Dang it! She has a paper due! Why did they close the lab?? Megan ReesERMS 5/13

20  Brian is a computer programmer at Synco Systems International. It’s an awesome company and he gets paid really well. He loves his job. He’s just finished writing a new software program for the company that will be used Internationally by hundreds of employees. He loves his job SO much. Three weeks later, Brian is shocked to find out he’s been let go due to “company cutbacks.” Brian is SO ticked off. Strangely, within minutes of Brian’s name being removed from the company database, the software program suddenly goes down, causing a huge breach in the company. Weird. Megan ReesERMS 5/13

21 Parsons, June Jamrich, and Dan Oja. Computer Concepts. Boston: Course Technology - Thompson Learning, 2002. Megan ReesERMS 5/13


Download ppt "Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other."

Similar presentations


Ads by Google