Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1. There are actually several categories of viruses. Antivirus software makers

ID: 3755749 • Letter: Q

Question

Q1. There are actually several categories of viruses. Antivirus software makers typically categorize viruses according to the way they spread from one computer to another, but other methods of categorization are also used. Go online and learn about the different categories of viruses. Create a table that names and describes each category.

Q2. Go online and find out how to report a virus. Based on your research, what is the benefit of reporting a virus after your computer system has been infected?

Explanation / Answer

Q1.

1) Browser Hijacker

This is a kind of ransomware that hijacks your browser easily and it is the most common way. It generates a problem where the homepage of your web gets automatically directed to a particular site. Its purpose is to generate traffic and increase income from website adverstisement. They usually have a word "search " in their names.

This virus is not common now. But at the time when flopp disk came into use more commonly. In todays scenario it can come into existence in a form of "Master boot record".It takes place in the is the first sector in the partitioned storage device of your computer.

This virus exists in the code used for site’s display. When you watch videos or click links by mistake on a malicious site this can lead to alter coding with the intent of infecting your computer.The code gets exerted into site even if the web master doesn’t know. Because the hackers leave the code in the comment section.

5) Resident Virus

This virus has the ability of run its own!

This is a very destructive virus. The virus works whenever you work o the operating system. It carries out operations by embeding itself into computer's memory. It can clear up space, delete, corrupt files and can leave the original file infected and run away itself too.

Melissa is most known macro virus. It affects user as well as their friends by mailing the copies of the infected files. Some examples are Ms Excel, Ms Word.

If security program is good it can scan these types of files before getting it downloaded

7) Multipartite Virus

Direct Action Virus

This virus comes into action when the person executes the file. The load is delivered to the person's computer and then virus becomes active.

It gets into action only if the file gets implemented again. Can say its the disadvantage of this virus.

Q2.

As new viruses are being generated and released everyday. The antivirus companies consits of developer do not have enough resources and capability to identify each and every virus infected applications.

So, benefit of reporting a virus is when a consumer sends a sample of suspicious file to report a virus to a company.

Reporting a virus will simply help enhance the level of protection by awaring developers about that particular virus and giving them a charge of sorting out the problem. They would analyze the virus and develop a countermeasure for any harmful programs.

So, as soon as you suspect a virus you need to:

1) Detect a virus

- Download an antivirus program

- Scan your computer and wait for results

- Suspicious applictions should be moved to virus vault or chest.

2) Reporting a virus

- Open an antivirus program prefer to have a shortcut on desktop.

- Access its vault or chest where u moved the suspicious application.

- Click right on the virus which you want to report and click on the "report virus to" or "send virus to"option or something like similar to it.

All the best :)

Happy to help

Please give a thumbs up.

Viruses   Description

1) Browser Hijacker

This is a kind of ransomware that hijacks your browser easily and it is the most common way. It generates a problem where the homepage of your web gets automatically directed to a particular site. Its purpose is to generate traffic and increase income from website adverstisement. They usually have a word "search " in their names.

2) File infector The file infector dwarfs the first file and re writes that file. It is one of the most common virus. Basically they stick to the files we use most often and whenever we run that file the virus starts running then it it takesover the file completely. 3)Boot sector virus

This virus is not common now. But at the time when flopp disk came into use more commonly. In todays scenario it can come into existence in a form of "Master boot record".It takes place in the is the first sector in the partitioned storage device of your computer.

4) Web Scripting Virus

This virus exists in the code used for site’s display. When you watch videos or click links by mistake on a malicious site this can lead to alter coding with the intent of infecting your computer.The code gets exerted into site even if the web master doesn’t know. Because the hackers leave the code in the comment section.

5) Resident Virus

This virus has the ability of run its own!

This is a very destructive virus. The virus works whenever you work o the operating system. It carries out operations by embeding itself into computer's memory. It can clear up space, delete, corrupt files and can leave the original file infected and run away itself too.

6) Macro Virus

Melissa is most known macro virus. It affects user as well as their friends by mailing the copies of the infected files. Some examples are Ms Excel, Ms Word.

If security program is good it can scan these types of files before getting it downloaded

7) Multipartite Virus

It is not the virus that spread in one way but in a multiway. It spreads and its actions depends on the type of operating systems they intent for and what type of the victim is using. 8) Polymorphic Virus It is harder to detect by ordinary antivirus. As this virus do encryption and changes its coding overtime and hence the operations by it are random which affects the programs user use. 9)

Direct Action Virus

This virus comes into action when the person executes the file. The load is delivered to the person's computer and then virus becomes active.

It gets into action only if the file gets implemented again. Can say its the disadvantage of this virus.