FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A COMPUTER VIRUS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following things is not done by an infected computer virus to spread itself?
A
It creates a copy of itself.
B
Any peripheral devices attached to a computer will not be affected by computer virus.
C
Whenever you open an application or a file or insert an external drive like pen drive, it will attach this copy to open file/program and copy onto disk/drive attached. That means, now the open application/file or pen drive is now infected with .virus
D
When an infected file gets run or opened, computer virus program makes a copy of itself and resides in memory.
E
Email virus infects your computer if you dont click on the link in the email or open/run attached file in the mail.
Explanation: 

Detailed explanation-1: -Which of them is not an ideal way of spreading the virus? Explanation: The ideal means of spreading computer virus are through emails, USB drives that are used portable and injected and ejected in different systems as well as from infected websites. Antivirus selling vendors do not place a virus in their CDs and DVDs.

Detailed explanation-2: -A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

Detailed explanation-3: -Viruses can be spread several ways, including via networks, discs, email attachments or external storage devices like USB sticks. Since connections between devices were once far more limited than today, early computer viruses were commonly spread through infected floppy disks.

Detailed explanation-4: -Typically, computer viruses spread through malicious online downloads, infected email attachments, or by plugging in infected hardware like an external flash drive (USB stick). Computer viruses can spread through almost any method of file sharing, as long as the virus can avoid detection by antivirus programs.

There is 1 question to complete.