WEB–BASED VIRUS ACTIVITY
Instructions:
 Using the Internet, log onto www.howstuffworks.com
 At the top of the web page, click in the bar where it says, "Search
HowStuffWorks and the web" and type in How Computer Viruses Work.
Answer the following questions below - it will be marked for completion. You
can either answer these questions on a lined piece of paper or save it as a
WORD document (File name: web-based virus activity questions).
 Be sure to include your name and today’s date.
Questions:
1. What is a virus?
A virus is a small piece of software that piggybacks on real programs.
2. List 2 forms of electronic infection and describe each.
i) EMAIL: An e-mail virus travels as an attachment to e-mail messages,
and usually replicates itself by automatically mailing itself to dozens of
people in the victim's e-mail address book.
ii) WORM: A worm is a small piece of software that uses computer
networks and security holes to replicate itself. A copy of the worm scans
the network for another machine that has a specific security hole.
3. What is a worm?
A worm is a small piece of software that uses computer networks and
security holes to replicate itself. A copy of the worm scans the network
for another machine that has a specific security hole.
4. What is Code Red?
Code Red is the first worm known not to multiply by copying itself to some files or
infecting them but only residing in the computers memory and multiplying by a
stream of data between computers.
5. Describe what an early virus was and how it worked.
Computer viruses were first widely seen in the late 1980s. Three factors of these
viruses were the spread of PCs, the use of computer bulletin boards and the
third factor that led to the creation of viruses was the floppy disk.
6. Explain why both executable & boot sector viruses are not very
threatening any more.
The reason for their decline has been the huge size of today's programs. Most
programs you buy today come on compact discs. Commercially distributed CDs
cannot be modified, and that makes viral infection of a CD unlikely, unless the
manufacturer permits a virus to be burned onto the CD during production.
7. Describe how the ILOVEYOU virus (which appeared on May 4, 2000)
worked.
It contained a piece of code as an attachment. People who double-clicked on the
attachment launched the code. It then sent copies of itself to everyone in the
victim's address book and started corrupting files on the victim's machine.
8. List 2 ways to protect yourself against viruses.
1. You should make sure that Macro Virus Protection is enabled in all Microsoft
applications, and you should NEVER run macros in a document unless you know
what they do.
2. If you're using an unsecured operating system, then installing virus protection
software is a nice safeguard. Many anti-virus options are available for free online.
9. List 3 reasons why people create viruses.
1. It is a scheme to make money. An example is if the virus creator locked down
your computer and forced you to pay a certain amount of money to get your
programming to function again.
2. Some people create viruses just for fun, sometimes learning purpose, or
simply playing prank on known or unknown people.
3. Some people write such programs just to prove that they can, they have the
ability and no one can stop them from doing so.

More Related Content

PPTX
Virus-Awareness
PPTX
Virus slides
PDF
Virus & Worms(20120628)
PPT
Viruses, Worms And Trojan Horses
DOC
Computer worm
PPTX
Virus and worms
PPT
Virus, Worms And Antivirus
PPTX
Computer virus
Virus-Awareness
Virus slides
Virus & Worms(20120628)
Viruses, Worms And Trojan Horses
Computer worm
Virus and worms
Virus, Worms And Antivirus
Computer virus

What's hot (20)

PPT
Computer Viruses
PPTX
Virus worm trojan
PPTX
Computer virus 1
PPT
As computer virus
PPTX
Computer viruses and prevention techniques
PPTX
PPTX
Computer virus
PPTX
Computer virus
PPTX
What is a virus and anti virus
PPT
Computer virus
PPTX
Avoiding email viruses
PPTX
Virus and worms analysis
PPTX
Introduction to Computer Virus
PPT
I Love You =D
PPT
Computer virus
PPT
virus,worms & analysis
PPTX
Kinds of Viruses
PPT
Computer viruses
PPT
Computer Worms
PPTX
Computer virus
Computer Viruses
Virus worm trojan
Computer virus 1
As computer virus
Computer viruses and prevention techniques
Computer virus
Computer virus
What is a virus and anti virus
Computer virus
Avoiding email viruses
Virus and worms analysis
Introduction to Computer Virus
I Love You =D
Computer virus
virus,worms & analysis
Kinds of Viruses
Computer viruses
Computer Worms
Computer virus
Ad

Viewers also liked (20)

PPTX
Urban Networks for a Sharing Economy
PDF
ITB Part Time FAQ's
PDF
Тех.Тебования YaMama
PPT
bigmamma.net History
PDF
Organic and Low-Spray Apple Production
PDF
товарищ
DOCX
Existing Film Production names
PDF
Aula rg trabalho cotar pb ap
PDF
E-catalog - bakeware
PDF
Energie aus der Tiefe - ANGER
PDF
Out Crossing, Heterozygosis and Inbreeding with Environments Interaction in R...
PDF
Rajeevdetails
PDF
Surya epaper 23 desember 2013
PDF
Strategie und praxis kommunikationscontrolling am beispiel bundesagentur für ...
PDF
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
PPTX
Nowości comarch cdn xl 10.5
PDF
Wege zur Optimierung mit Google Analytics und Tag-Management-Systemen
PDF
oriflamesuccessplan-110413131637-phpapp02
PDF
My lectures on suez canal crisis lecture ten
Urban Networks for a Sharing Economy
ITB Part Time FAQ's
Тех.Тебования YaMama
bigmamma.net History
Organic and Low-Spray Apple Production
товарищ
Existing Film Production names
Aula rg trabalho cotar pb ap
E-catalog - bakeware
Energie aus der Tiefe - ANGER
Out Crossing, Heterozygosis and Inbreeding with Environments Interaction in R...
Rajeevdetails
Surya epaper 23 desember 2013
Strategie und praxis kommunikationscontrolling am beispiel bundesagentur für ...
Defcon 22-blake-self-cisc0ninja-dont-ddos-me-bro
Nowości comarch cdn xl 10.5
Wege zur Optimierung mit Google Analytics und Tag-Management-Systemen
oriflamesuccessplan-110413131637-phpapp02
My lectures on suez canal crisis lecture ten
Ad

Similar to Web virus activity (20)

PPT
Computer Virus And Antivirus-Sumon Chakraborty
DOCX
Computer viruses by joy chakraborty
RTF
εργασια
PPTX
Viruses
PPTX
Computervirus
DOCX
Computer virus
PPT
Virus and antivirus
PDF
COMPUTER VIRUSES AND WORMS.pdf
PDF
Computer viruses
PDF
computer virus Report
PDF
Anti virus
PPT
Viruses.ppt
PPT
Viruses.ppt
PPT
Viruses (2).ppt
PPT
Viruses.ppt
PPT
Viruses.ppt
PPT
Viruses (1).ppt
PPT
Viruses
PDF
Protecting your computer_from_viruses
PPT
How Computer Viruses Work
Computer Virus And Antivirus-Sumon Chakraborty
Computer viruses by joy chakraborty
εργασια
Viruses
Computervirus
Computer virus
Virus and antivirus
COMPUTER VIRUSES AND WORMS.pdf
Computer viruses
computer virus Report
Anti virus
Viruses.ppt
Viruses.ppt
Viruses (2).ppt
Viruses.ppt
Viruses.ppt
Viruses (1).ppt
Viruses
Protecting your computer_from_viruses
How Computer Viruses Work

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Architecture types and enterprise applications.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Tartificialntelligence_presentation.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Getting Started with Data Integration: FME Form 101
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
WOOl fibre morphology and structure.pdf for textiles
PPT
Geologic Time for studying geology for geologist
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
observCloud-Native Containerability and monitoring.pptx
Chapter 5: Probability Theory and Statistics
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Architecture types and enterprise applications.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
Univ-Connecticut-ChatGPT-Presentaion.pdf
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
Tartificialntelligence_presentation.pptx
A novel scalable deep ensemble learning framework for big data classification...
CloudStack 4.21: First Look Webinar slides
Getting Started with Data Integration: FME Form 101
Taming the Chaos: How to Turn Unstructured Data into Decisions
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Assigned Numbers - 2025 - Bluetooth® Document
WOOl fibre morphology and structure.pdf for textiles
Geologic Time for studying geology for geologist
A contest of sentiment analysis: k-nearest neighbor versus neural network
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
observCloud-Native Containerability and monitoring.pptx

Web virus activity

  • 1. WEB–BASED VIRUS ACTIVITY Instructions:  Using the Internet, log onto www.howstuffworks.com  At the top of the web page, click in the bar where it says, "Search HowStuffWorks and the web" and type in How Computer Viruses Work. Answer the following questions below - it will be marked for completion. You can either answer these questions on a lined piece of paper or save it as a WORD document (File name: web-based virus activity questions).  Be sure to include your name and today’s date. Questions: 1. What is a virus? A virus is a small piece of software that piggybacks on real programs. 2. List 2 forms of electronic infection and describe each. i) EMAIL: An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. ii) WORM: A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. 3. What is a worm? A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. 4. What is Code Red? Code Red is the first worm known not to multiply by copying itself to some files or infecting them but only residing in the computers memory and multiplying by a stream of data between computers.
  • 2. 5. Describe what an early virus was and how it worked. Computer viruses were first widely seen in the late 1980s. Three factors of these viruses were the spread of PCs, the use of computer bulletin boards and the third factor that led to the creation of viruses was the floppy disk. 6. Explain why both executable & boot sector viruses are not very threatening any more. The reason for their decline has been the huge size of today's programs. Most programs you buy today come on compact discs. Commercially distributed CDs cannot be modified, and that makes viral infection of a CD unlikely, unless the manufacturer permits a virus to be burned onto the CD during production. 7. Describe how the ILOVEYOU virus (which appeared on May 4, 2000) worked. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine. 8. List 2 ways to protect yourself against viruses. 1. You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. 2. If you're using an unsecured operating system, then installing virus protection software is a nice safeguard. Many anti-virus options are available for free online. 9. List 3 reasons why people create viruses. 1. It is a scheme to make money. An example is if the virus creator locked down your computer and forced you to pay a certain amount of money to get your programming to function again. 2. Some people create viruses just for fun, sometimes learning purpose, or simply playing prank on known or unknown people. 3. Some people write such programs just to prove that they can, they have the ability and no one can stop them from doing so.