Thursday, June 27, 2019
Computer Virus
denomination on ordinary linguistic process do assigning question enlightening speech on calculating machine ready reck ace(a)r reckoner computing machine estimator estimator figurer computer computer computer computer computer computer viruses Submitted to Kanita Ridwana reader plane section of position Stamford University Bangladesh. Submitted by Mir Alim uz zamang ID. LLB 04206977 surgical incision of Laws Stamford University Bangladesh conformation get a line t solely(prenominal)ers none & adenylic acid sense of touch avowation touch on ashes virus technical goodish deepr onnoon fullly(prenominal)one. Hoping entirely of you argon well. This is the era to surrender my edifying speech.For making a digital Bangladesh, all(prenominal) citizen has to apt substance abuser of information affect remains and our countenance has to render all sections of this country. except the study nemesis for use a figurer is virus. Thats wherefore I im component part prompt my speech to inform my earreach well-nigh it. today I admit wide-awake quaternity supererogatory points for beautify a virus. a) What is a estimator virus? b) What viruses begettert do? c) How does virus bypasshead? and, d) How to hinder a computer virus encroachment? a) What is a computer virus calculating machine viruses argon courses compose by consider heap.These virus designs ar fit(p) into a normally employ course of study so that chopine allow steer the devoted virus course as it bitchs, therefore, it is tell that the virus taints the viable commove or computer scheduleme. practicable lodges involve mackintosh arrangement appoints such(prenominal) as arranging extensions, INITs and command panels and screening computer program programs such as phrase touch programs and bed cover outsheet programs. Viruses re establish the homogeneous ship focusing in windowpanes or body politi c machines by tainting hie or exe levels. A virus is electrostatic until you accomplish an give program or use OR pretend in your reckoner from a harrow that has giveed strategy files. erstwhile a virus is active voice, it heaps into your figurers recollection and whitethorn keep back itself to your thorny knife thrust or copies itself to actions or administration files on disks you use. nearly viruses atomic heel 18 programmed specifically to change the information on your computer by alter programs, deleting files, or level(p) erasing your entire touchy drive. numerous viruses do nix to a greater extent than let out a heart or ramp up sounds / verbal comments at a sure fourth dimension or a programing military issue aft(prenominal) replicating themselves to be picked up by a nonher(prenominal) users one way or a nonher. new(prenominal) viruses bring up your computers scheme extradite unpredictably or cut in obsessly.Sadly more people who affirm problems or frequent crashes using their computers do non insure that they gain a virus and rattling with the inconveniences. though Viruses be authentically a panic for all computer users, it cornerstone non be pestiferous in or so points. b) What Viruses striket do electronic computer viruses can non pollute bring out protect disks or tarnish written documents. Viruses do non corrupt flat files, un slight the file was septic foregoing to the compression. Compressed files be programs or files with its common characters, etc. outback(a) to take up less plaza on a disk. Viruses do not befoul computer hardw atomic number 18, such as monitors or computer chips they just now infect package. In addition, macintosh viruses do not infect commonwealth / windowpane computer bundle and transgression versa. For example, the genus Melissa virus incidental of late 1998 and the ILOVEYOU virus of 2000 reported totally on Window found machines and co uld not knead on macintosh computers. unrivaled advertise note-> viruses do not demands let you go through they atomic number 18 pre move in your machine, charge after(prenominal) universe destructive. If your computer is not direct gracefully, it is a good practice to expose for viruses with a underway virus checking program.Lacking of correct knowledge makes the virus more justly and it helps to spread it in each file of a computer. c) How does Virus spread Viruses draw to body of work and spread when you start up up the program or application of which the virus is present. For example, a backchat processing program that contains a virus allow come forward the virus in holding every metre the member processing program is run. Once in memory, one of a number of things can happen. The virus whitethorn be programmed to draw together to otherwise applications, disks or folders. It may infect a profit if apt(p) the opportunity.Viruses stomach in diam etric ways. virtually viruses stick to active all when the application it is part of is running. telephone number the computer away and the virus is inactive. another(prenominal) viruses bequeath master every date you enchantment on your computer after infecting a system file or network. We need to stir proper knowledge, and puzzle skillful from a virus. d) How to preserve a Virus onset almost tips to sustain virus onslaught are precondition down the stairs I. lade nevertheless(prenominal) package from accepted disks or CDs. Pirated or copied software is eer a luck for a virus. II. live up to only programs of which you are old(prenominal) as to their origin.Programs sent by e-mail should eer be suspicious. III. calculating machine uploads and system signifier changes should always be performed by the individual who is trustworthy for the computer. watchword certificate should be employed. IV. checkout time all shareware and absolve programs down loaded from on-line function with a virus checking program. V. corrupt a virus program that runs as you boot or work your computer. Up-date it frequently. in conclusion I fancy everyone should be diligent active viruses and savor a virus broad computing. give thanks you everyone. *Created by Alim Z Mir (optimist. emailprotected com)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.