(a) Permanence: Some viruses are able to ruin the functionality of different parts of the computer such as CMOS battery or master boot record. If a computer is formatted and the infected application or program is still on a backup disk, the virus can easily re-infect the computer.
Viruses can affect files or applications in numerous ways. They usually attack .com, exe, sys, .bin, pif or any other data files. Viruses have an ability to infect any file and often seek for executable files or data files including word or excel document to replicate.
(b) Transmissible: Computer viruses are small software programs which can carry other similar viruses, thereby making the virus dangerous. The primary virus takes a shelter behind the other or gain assistance to infect a particular section of the computer.
(c) Stealth: The stealth virus first attaches itself to files on the computer and then attacks the computer.
(d) Memory or non memory resident: A virus is either memory resident where the virus is first loaded into memory and infects a computer subsequently or non memory resident where the virus code runs each time a file is opened.
(e) Polymorphic: Some viruses have an ability to change their code. This means a virus can carry several amounts of similar variants. Email viruses that keep on changing the subject or body of the message to prevent recognition are believed to have same properties.
maurice.mutuku answered the question on April 14, 2018 at 14:00
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018. Answers (1)
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018. Answers (1)
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018. Answers (1)
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018. Answers (1)
- What is data security?(Solved)
Define data security.
Date posted: April 14, 2018. Answers (1)
- What is data privacy?(Solved)
Define data privacy.
Date posted: April 14, 2018. Answers (1)
- Which procedure would you use in accessing a research topic notes from the Internet?(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted: April 14, 2018. Answers (1)
- What are the qualities of good e-mail contact management software?(Solved)
Give the qualities of good e-mail contact management software.
Date posted: April 14, 2018. Answers (1)
- Explain some commonly used workbook management practices when working on MS Excel.(Solved)
Explain some commonly used workbook management practices when working on MS Excel.
Date posted: April 14, 2018. Answers (1)
- State the basic keyboard shortcut keys used to format and edit a spreadsheet.(Solved)
State the basic keyboard shortcut keys used to format and edit a spreadsheet.
Date posted: April 14, 2018. Answers (1)
- State the keyboard shortcuts used in navigating through a spreadsheet.(Solved)
State the keyboard shortcuts used in navigating through a spreadsheet.
Date posted: April 14, 2018. Answers (1)
- Explain the most fundamental keyboard shortcuts when dealing with spreadsheets.(Solved)
Explain the most fundamental keyboard shortcuts when working with spreadsheets.
Date posted: April 14, 2018. Answers (1)
- What is the use of WAP and WML with regard to telephone messaging in handsets?(Solved)
Discuss the use of WAP and WML with regard to telephone messaging in handsets.
Date posted: April 14, 2018. Answers (1)
- Three methods of detecting system errors(Solved)
Three methods of detecting system errors.
Date posted: April 14, 2018. Answers (1)
- What are the features of an e-mail document?(Solved)
Highlight the features of any e-mail document.
Date posted: April 14, 2018. Answers (1)
- What are the parts of an email document?(Solved)
Highlight the parts of an email document.
Date posted: April 14, 2018. Answers (1)
- Explain properly the meaning of the term Data Mining and explain the benefits of data mining.(Solved)
Explain properly the meaning of the term Data Mining and explain the benefits of data mining.
Date posted: April 14, 2018. Answers (1)
- Outline the four major symbols used by functional modelling perspective to describe a process.(Solved)
Outline the four major symbols used by functional modelling perspective to describe a process.
Date posted: April 14, 2018. Answers (1)
- Briefly explain the concept of functional modeling in DBMS.(Solved)
Briefly explain the concept of functional modeling in DBMS.
Date posted: April 14, 2018. Answers (1)
- Briefly discuss the history of the evolution of the internet.(Solved)
Briefly discuss the history of the evolution of the internet.
Date posted: April 14, 2018. Answers (1)