Skip to main content

Best presentation on computer virus

ABSTRACT:

Computer viruses  poses problems for users of personal computers.These viruses have been from mid 1980s.A computer virus is a special kind of computer program which spreads across disks by making copies of itself.In order to infect a computer the virus should have the chance to execute its code.As long as the computer is infected with virus can copy itself to other files or disks that are accessed.


DEFINITION:A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications  or files.

Types of computer Virus.

§ There are three types of computer virus

v Boot virus

v Program virus                                                                

v Micro virus

1. Boot virus:  Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.

2. Program Virus:  These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR. program files are attractive targets for computer virus because they are widely used and have relativity, simple formats to which  viruses can attach themselves.

3. Macro Viruses:  These viruses infects data files. For example, Microsoft word document and template files are susceptible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.

Ø A virus tries to take control of computer system it has infected at the first opportunity availible.it makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer



Top 5 Sources of Computer Virus Attack:

v The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks.  The top sources of virus attacks are highlighted below:

Ø Downloadable Programs

Ø Cracked Software

Ø Email Attachments

Ø Internet

Ø Booting From CD



Best antivirus software.

§ Norton antivirus.

§ MacAfee virus scan

§ Kaspersky antivirus

Comments

Popular posts from this blog

rule based machine translation

Hi friend today let us know about rule based machine translation.this one of  approaches of machine translation and this is  earliest machine translation approach Rule-based machine translation   (RbMT) refers to a  machine translation engine  built on algorithms that analyze the syntax of the  source language  and uses rules to transfer the meaning to the  target languag e  by building a sentence.  The rule based machine translation systems are developed  in early 1970’s they are -Systran -Japanese mt -eurotra At present following companies using  rule based machine translation are - Apertium - GramTrans  The RBMT is based on linking structure  of given input with structure of demanded output service necessarily preserving their unique meaning. For this process we need following -           A dictionary that will map every world of source language to target language -           Rules representing regular source sentence structure -           Rules represe

How to download pppts from this blog

Hi everyone We provide interesting seminar topics with ppt presentation.if you have a problem downloading seminar presentation follow following steps Click on menu Select download a copy.                                     Click here to see all our seminar topics with. Ppt presentationon and abstract

Google home

Hi everyone we all know that Google is a big innovative company.It is coming up with good innovations from time to time. Her is another best innovation of Google The Google home.Immagine a smart speaker that could not only play music but also act as a personal assistant.This could operate on our voice commands using Google Assistant.You could play  music from Services like spotify, YouTube music, Pandora,IHeartRadio and many more and also you can play music from your phone either by connecting it to Google home by using Bluetooth or by 100+chrome cast Enabled audio app just by commanding Ok Google and saying song details to play the song you can also play music based on your mood ,and you can  also play a personised content just by commanding ok Google or hello Google  and giving  the details.This is really a interesting feature of Google home as a speaker isn't it  It has many more features.You can also set reminder to go to any place or you can aslo set alarm. Another