answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Are optical disk disks are random access storage devices?

floppy disks are read/write storage devices, they are a backing store, a non-volatile long term storage which will not lose data when power is lost.

Random access storage is the original term for RAM, the random access memory term was used a a marketing term and has stuck since.

Another Answer

YES - floppy disk are Random Access storage devices.

What influenced the use of binary number system as the basis of computer language?

It makes the computer circuits much simpler. It is fairly simple to have circuit elements that can have two different states, and to do operations (like addition or multiplication) on those states.

How does computer use binary code?

Binary is a counting or numbering system with only 2 symbols - "0" and "1". When ever we count something, we start with nothing or "0". This is an important fact that is common between all numbering systems. We always start with 0 things and add from there. This is important because if all numbering systems didn't have this specific starting point, we could not translate between them.

The way binary works is this: starting with nothing we have "0", then we add one object to get "1". If we add another object, we force an overflow into the next column like this: "12 + 12 = 102" then "102 + 12 = 112"..."112 + 12 = 1002"

This is the same thing that happens in any numbering system. When the symbols are all used in the first column, adding another object forces an overflow into the next higher column of power. In Decimal, we are used to "1010" following 9, as in 9+1. In binary, there are only two symbols, so it overflows to the next higher column rather fast. The following is how we count in binary with four bits (Binary Digits)...

0000

0001

0010

0011

0100

0101

0110

0111

1000

1001

1010

1011

1100

1101

1110

1111

"1111" is the max count for four bits. In order to count another object, we have to use the next higher column... 10000.

Why binary system use in computer?

Because CPUs (heart of computer) main part consists of triggers - electronic devices that can be in one of two possible states: charged, discharged. So, one trigger can store one binary digit. Combining triggers in rows we can store big binary digits. Adding combinational logic we can perform basic ariphmetics.

How do you completely remove documents from your PC?

In order to make sure the files are permanently deleted from your computer you must use a special software to do so.

An example of such a software are:
http:/www.deletefilespermanently.com

Change icons on windows desktop?

You can only change the desktop items if they are in folder form (you have to have created a folder yourself ). You can do this by right clicking on the desktop > then new > then folder.

Once you have your folder and have given it a name. Right click the folder and select properties > then you should see a customize tab > then towards the bottom of that window should be a section called "folder icons" in that box should be "change icon" click that and you can select an icon of your choice.

What advantage does optical disk storage have over magnetic disk storage?

Optical disk storage offers several advantages over magnetic disk storage, including greater durability and resistance to environmental factors such as dust and magnetic fields. Additionally, optical disks typically have a longer shelf life, making them suitable for archival purposes. They also tend to consume less power during operation and are often lighter and more portable than magnetic disks. However, optical disks generally have slower read/write speeds compared to magnetic disks.

What is a List of computer viruses with their functions?

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms

A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses

Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Hope i helped!

How can you fix a computer virus on your computer?

Depending on what Anti-Virus software you use will tell you where the virus is and also delete it and store it away in a vault. AVG one of the well known and partly free softwares that can be downloaded locates and can delete the virus. Hope this answers your question.

Does this computer have a virus?

There are some indicators that a computer might be infected which are available at Microsoft site
Scan your system regularly with antivirus and antispyware.
Update your softwares frequently.

The system tools folder is typically found?

This is highly dependent on the operating system. Further, most operating systems rarely require you to find their utilities where they are stored but you can generally just invoke them the normal way for your OS.

For Windows they are likely scattered all over C:\WINDOWS.

Linux will usually keep its system utilities in /sbin and /usr/sbin.

What is an exe file?

Exe is a file extension for an executable file, which contains a program file that is capable of being executed or run as a program in the computer. When an Exe file is opened, it makes the operating system to run the program. Exe files can easily get corrupted by hackers, so always make sure to receive exe files only from trusted sources so that they do not contain a virus. Malware programmers or cybercriminals write different types of malicious programs and name them with .exe extension to spread virus over the internet.

File-intelligence is a malware search engine site. It provides detailed description of the existence of exe files with different file names.

Can all computer viruses be detected?

Yes, anti-virus software automatically detect all viruses on this condition that the anti-virus software installed should be updated timely for the latest viruses. Ashish Srivastava, Rashmi khand, Lucknow

What is smallest addressable unit of storage on a disk?

It is called a block (or sector). The size of the block varies depending upon the size of the disk, advanced preferences (the size of files normally being used on that disk), and the filesystem being used. They normally run from 512Bytes to 64KiB. As disk capacity continues to grow, look for even larger block sizes to come :-)

How virus attack computer?

For a computer application to be called a virus, it must do several things.

Most importantly, it must be able to copy itself into the computer in such a way that the copies can also copy themselves into the computer as well.

After a computer virus is able to spread, the virus programer is able to do other activities depending on his own goals. He might want to have your computer send emails to everyone in your address book. He might want to detect passwords and send the passwords back to himself. He might want to damage the computer in some way by writing damaging code into the operating system or onto the directory of the hard drive.

The most common way that computer viruses attack computer programs is by adding the virus code onto the end of the program so that each time the program is run, the virus code is run as well. The original program might be the operating system or some other application.

When the computer is busy running the virus code, it may not run the original program, or it may cause so much activity that the whole computer slows down or crashes.

How do you remove the virus called 'iexplore.exe - Bad Image'?

Your system has been seriously infected by a rootkit virus.

You won't be able to scan in regular mode. Boot into Safe Mode and scan with "malwarebyte anti-malware", see if it helps

Scan with Avira Antivir in Safe Mode as well.

If you don't know any of these antivirus, google them.

Also, adding my part to this... I had the Bad Image error keep coming up on my PC. Come to find out after google searching, it is a Virus so says a few sources http://www.spywareremove.com/removebadimagevirus.html

IT looks to be malware that can be removed with antimalware software.

Can twitter give your computer a virus?

By registering or entering Twitter it doesn't give you any viruses ,but you should be careful not to click on any "phishing" or misleading links, such as random advertisements or other links that looks weird to you.

How do Internet service providers provide an Internet service?

The function of an Internet service provider is simply to provide Internet service to those who need Internet service. Internet service providers or ISP's, may offer dial-up or broadband service to consumers.