A computer virus destroys all the data files & programs in the computer memory by interfering with the normal processes of the operating system.
Precautions against computer viruses:
Anti-virus software.
Use Antivirus software to detect & remove known viruses from infected files.
Some of the commonly used Antivirus software are: Dr. Solomon’s Toolkit, Norton
Antivirus, AVG Antivirus, PC-Cillin, etc
NB: The best way to prevent virus is to have a memory-resident antivirus software, which will detect the virus before it can affect the system. This can be achieved by installing a GUARD program in the RAM every time the computer boots up. Once in the RAM, the antivirus software will automatically check diskettes inserted in the drives and warn the user immediately if a disk is found to have a virus.
- For an antivirus to be able to detect a virus, it must know its signature. Since virus writers keep writing new viruses with new signatures all the time, it is recommended that you update your antivirus product regularly so as to include the latest virus signatures in the industry.
- The Antivirus software installed in your computer should be enabled/activated at all times.
- You should also perform virus scans of your disks on a regular basis.
- Evaluate the security procedures to ensure that the risk of future virus attack is minimized.
francis1897 answered the question on March 15, 2023 at 06:14
- Describe power failure as a cause of data loss in computers(Solved)
Describe power failure as a cause of data loss in computers
Date posted: March 15, 2023. Answers (1)
- What are the main cause of power disruptions?(Solved)
What are the main cause of power disruptions?
Date posted: March 15, 2023. Answers (1)
- What are the precautions against data loss due to power failure?(Solved)
What are the precautions against data loss due to power failure?
Date posted: March 15, 2023. Answers (1)
- What are the environmental threats to computers and information systems and the security measures against them?(Solved)
What are the environmental threats to computers and information systems and the security measures against them?
Date posted: March 15, 2023. Answers (1)
- A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors...(Solved)
A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors and omissions. What do we secure in computers?
Date posted: March 15, 2023. Answers (1)
- What is computer security?(Solved)
What is computer security?
Date posted: March 15, 2023. Answers (1)
- What are rules that must be observed in order to keep within the law when working with data?(Solved)
What are rules that must be observed in order to keep within the law when working with data?
Date posted: March 15, 2023. Answers (1)
- What are log files?(Solved)
What are log files?
Date posted: March 15, 2023. Answers (1)
- With the aid of a diagram, describe data encryption(Solved)
With the aid of a diagram, describe data encryption
Date posted: March 15, 2023. Answers (1)
- Describe audit trails as a way of detection and protection against computer crimes(Solved)
Describe audit trails as a way of detection and protection against computer crimes
Date posted: March 15, 2023. Answers (1)
- State some of the ways of reducing piracy(Solved)
State some of the ways of reducing piracy
Date posted: March 14, 2023. Answers (1)
- What are the different ways tapping may take place?(Solved)
What are the different ways tapping may take place?
Date posted: March 14, 2023. Answers (1)
- Who is an hacker?(Solved)
Who is an hacker?
Date posted: March 14, 2023. Answers (1)
- Give the reasons for hacking(Solved)
Give the reasons for hacking
Date posted: March 14, 2023. Answers (1)
- Discuss the types of computer crimes.(Solved)
Discuss the types of computer crimes.
Date posted: March 14, 2023. Answers (1)
- What causes errors and accidental access to data and information?(Solved)
What causes errors and accidental access to data and information?
Date posted: March 14, 2023. Answers (1)
- Discuss the forms of unauthorized access(Solved)
Discuss the forms of unauthorized access
Date posted: March 14, 2023. Answers (1)
- In your own view, what are some of the intentions of the people who may want to access data without permission?(Solved)
In your own view, what are some of the intentions of the people who may want to access data without permission?
Date posted: March 14, 2023. Answers (1)
- State the types of destructions/damages caused by a virus attack(Solved)
State the types of destructions/damages caused by a virus attack
Date posted: March 14, 2023. Answers (1)
- What are the two tasks a virus (computer code) is designed to undertake?(Solved)
What are the two tasks a virus (computer code) is designed to undertake?
Date posted: March 14, 2023. Answers (1)