Essays on Computer Virus

Solutions to Computer Viruses Analytical Essay

Introduction, solutions to computer viruses, works cited.

As much as technology is useful to human beings, it comes with its challenges. One of such challenge that has troubled technology users for a long period of time is computer viruses. They refer to computer programs that are created by malicious software developers or computer programmers to harm other people’s computers.

Computer viruses are a great problem as they cause damage to data and they can potentially lead to system malfunction (Brain 1). Other viruses can be used by hackers to get information from other people’s computers without permission.

The best solution for the problem of computer viruses is installation of antivirus software on computer systems. Once antivirus software is installed in a computer system, it protects the computer system from such malicious software and ensures that any program that runs in the computer system is authorized.

Examples of antivirus software include Kaspersky, McAfee, Norton, Avast etcetera. The only down side of antivirus software is that they are also programs and thus they are not intrinsically perfect.

The antivirus software is thus frequently updated in order for it to efficiently protect a computer system (Brain 1). This may prove to be expensive to the user although the cost of updating antivirus software is not as high as the initial cost of acquiring the antivirus software.

The computer system user should also be extra careful while using his/her computer. This is especially crucial when the user is working with online application since the World Wide Web has many viruses. Sometimes hackers and virus developers may even develop an application that will ask the user to click on a window to see what it contains.

On clicking the window, the virus is permitted to run in the users computer systems and, this way, it may lead to performance bottlenecks or cause serious loss of data. It is thus of essence for users to ensure that they do not run applications that they are not sure about.

Users should also avoid being gullible while viewing high risk sites like entertainment sites in which such applications are found. Other links and images that may be sent as spam messages by hackers and virus developers should also be avoided. This is because most computers get infected with viruses though the use of the internet.

With the continued use of, and advancement in, technology, a lot of technology-related problems have arisen. Viruses are more destructive than ever. Organizations are continually losing important and costly information.

This calls for keener and greater care of our computer systems against the effects of viruses. Other measures that people can take to mitigate the effects of viruses are ensuring that files are properly backed-up so that once information is lost the organization does not go back to the drawing board.

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.

For instance, files and information in a computer system operating a Windows Operating System can be salvaged by running a live CD of the Linux OS.

This is done by booting the computer system from the Linux OS CD and finding the files that are not part of the Windows System files, and are not created by the user. The only disadvantage of this kind of operation is that it requires a highly intelligent IT (Information Technology) professional.

Brain, Marshall. “ How Computer Viruses Work ”. 2010. Web.

  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2018, May 22). Solutions to Computer Viruses. https://ivypanda.com/essays/technology-issue/

"Solutions to Computer Viruses." IvyPanda , 22 May 2018, ivypanda.com/essays/technology-issue/.

IvyPanda . (2018) 'Solutions to Computer Viruses'. 22 May.

IvyPanda . 2018. "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

1. IvyPanda . "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

Bibliography

IvyPanda . "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

  • Much Lighter: Talking to Andrew McAfee
  • McAfee Labs Threats Report: August 2015
  • Linux, the Operating System of Choice
  • Security Threats in Social Sites
  • Reasons why developing software for wireless devices is challenging
  • Moral and Ethical Issues in Science and Technology
  • Database Application at Amazon
  • Club IT's Data Management

Logo

Essay on Antivirus

Students are often asked to write an essay on Antivirus in their schools and colleges. And if you’re also looking for the same, we have created 100-word, 250-word, and 500-word essays on the topic.

Let’s take a look…

100 Words Essay on Antivirus

What is antivirus.

Antivirus is a type of software. Its job is to protect your computer from harmful programs called viruses. These viruses can damage your computer or steal your private information.

How does Antivirus work?

Antivirus software scans your computer to find viruses. It looks at the code of each file to see if it matches known viruses. If it finds a match, it alerts you and removes the virus.

Types of Antivirus

There are many types of antivirus software. Some are free, and some you have to pay for. Examples include Avast, Norton, and McAfee. Each one works a bit differently.

Why is Antivirus important?

Having antivirus software is very important. It keeps your computer safe and your information private. Without it, you could lose important files or have your personal details stolen.

How to use Antivirus?

Using antivirus software is easy. You install it on your computer, and it starts working. It will scan your computer regularly. If it finds a virus, it will tell you and help you remove it.

Also check:

  • Advantages and Disadvantages of Antivirus

250 Words Essay on Antivirus

Antivirus is a type of software. It is designed to protect your computer from harmful programs called viruses. Viruses can slow down your computer, steal your information, or even damage your files. Antivirus works like a shield, stopping these viruses from harming your computer.

How Does Antivirus Work?

Antivirus software works in two main ways. First, it scans your computer to find viruses. It looks at all your files and checks if any of them match known viruses. This is called virus scanning. If it finds a match, it will alert you and offer to remove the virus.

Second, it watches what happens on your computer in real time. This is called real-time protection. If it sees something suspicious, like a program trying to change a file without permission, it will stop it. This helps catch new viruses that aren’t in its list yet.

Why Do We Need Antivirus?

We need antivirus because the internet is full of potential threats. Viruses can come from emails, websites, or even from plugging in a USB stick. Without antivirus, your computer is like a house with no locks. Anyone can come in and take what they want. With antivirus, your computer is safe and secure.

In conclusion, antivirus is a vital tool for keeping our computers safe. It works by scanning for known viruses and watching for suspicious activity. Without it, our personal information and files could be at risk. So, it’s important to always have an up-to-date antivirus program on your computer.

500 Words Essay on Antivirus

Antivirus is a type of software that helps protect your computer from harmful things called viruses. Just like we get sick from germs, computers can get sick from viruses. These viruses can slow down your computer, delete your files, or even steal your personal information. Antivirus software works like a shield, stopping these viruses before they can harm your computer.

Antivirus software works in two main ways. First, it scans your computer to find viruses that might already be there. This is like a doctor checking you for signs of illness. If the antivirus finds a virus, it works to remove it and heal your computer.

The second way antivirus works is by keeping a watchful eye on your computer all the time. It checks the files you download and the websites you visit to make sure they are safe. If it sees something dangerous, it stops it before it can harm your computer. This is like a bodyguard, always ready to protect you from harm.

We need antivirus software because the internet is full of viruses. These viruses are created by people who want to harm others or steal their information. Without antivirus software, your computer is like a house with no doors or windows. Anyone can come in and take what they want.

With antivirus software, your computer has strong doors and windows that keep out unwanted visitors. It helps keep your computer running smoothly and protects your personal information. This is why it’s important to have antivirus software on your computer.

Choosing the Right Antivirus

There are many different types of antivirus software. Some are free, and some cost money. When choosing an antivirus, it’s important to pick one that suits your needs.

Free antivirus software can provide basic protection, but it might not be enough if you use your computer a lot or have important files. Paid antivirus software usually offers more protection and extra features, like customer support or protection for multiple devices.

Before choosing an antivirus, do some research. Read reviews, check the features, and make sure it’s from a trusted company. This will help you make the best choice for your computer’s safety.

In conclusion, antivirus software is an important tool for keeping our computers safe. It works like a shield, protecting our computers from harmful viruses. By choosing the right antivirus, we can surf the internet without worry, knowing our computers and personal information are safe. Just like we need to take care of our health, we also need to take care of our computers. That’s why having antivirus software is so important.

That’s it! I hope the essay helped you.

If you’re looking for more, here are essays on other interesting topics:

  • Essay on Anti Semitism
  • Essay on Anti Terrorism
  • Essay on Apiculture

Apart from these, you can look at all the essays by clicking here .

Happy studying!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

conclusion of computer virus essay

  • Search Menu
  • Browse content in Arts and Humanities
  • Browse content in Archaeology
  • Anglo-Saxon and Medieval Archaeology
  • Archaeological Methodology and Techniques
  • Archaeology by Region
  • Archaeology of Religion
  • Archaeology of Trade and Exchange
  • Biblical Archaeology
  • Contemporary and Public Archaeology
  • Environmental Archaeology
  • Historical Archaeology
  • History and Theory of Archaeology
  • Industrial Archaeology
  • Landscape Archaeology
  • Mortuary Archaeology
  • Prehistoric Archaeology
  • Underwater Archaeology
  • Urban Archaeology
  • Zooarchaeology
  • Browse content in Architecture
  • Architectural Structure and Design
  • History of Architecture
  • Residential and Domestic Buildings
  • Theory of Architecture
  • Browse content in Art
  • Art Subjects and Themes
  • History of Art
  • Industrial and Commercial Art
  • Theory of Art
  • Biographical Studies
  • Byzantine Studies
  • Browse content in Classical Studies
  • Classical History
  • Classical Philosophy
  • Classical Mythology
  • Classical Literature
  • Classical Reception
  • Classical Art and Architecture
  • Classical Oratory and Rhetoric
  • Greek and Roman Papyrology
  • Greek and Roman Epigraphy
  • Greek and Roman Law
  • Greek and Roman Archaeology
  • Late Antiquity
  • Religion in the Ancient World
  • Digital Humanities
  • Browse content in History
  • Colonialism and Imperialism
  • Diplomatic History
  • Environmental History
  • Genealogy, Heraldry, Names, and Honours
  • Genocide and Ethnic Cleansing
  • Historical Geography
  • History by Period
  • History of Emotions
  • History of Agriculture
  • History of Education
  • History of Gender and Sexuality
  • Industrial History
  • Intellectual History
  • International History
  • Labour History
  • Legal and Constitutional History
  • Local and Family History
  • Maritime History
  • Military History
  • National Liberation and Post-Colonialism
  • Oral History
  • Political History
  • Public History
  • Regional and National History
  • Revolutions and Rebellions
  • Slavery and Abolition of Slavery
  • Social and Cultural History
  • Theory, Methods, and Historiography
  • Urban History
  • World History
  • Browse content in Language Teaching and Learning
  • Language Learning (Specific Skills)
  • Language Teaching Theory and Methods
  • Browse content in Linguistics
  • Applied Linguistics
  • Cognitive Linguistics
  • Computational Linguistics
  • Forensic Linguistics
  • Grammar, Syntax and Morphology
  • Historical and Diachronic Linguistics
  • History of English
  • Language Evolution
  • Language Reference
  • Language Acquisition
  • Language Variation
  • Language Families
  • Lexicography
  • Linguistic Anthropology
  • Linguistic Theories
  • Linguistic Typology
  • Phonetics and Phonology
  • Psycholinguistics
  • Sociolinguistics
  • Translation and Interpretation
  • Writing Systems
  • Browse content in Literature
  • Bibliography
  • Children's Literature Studies
  • Literary Studies (Romanticism)
  • Literary Studies (American)
  • Literary Studies (Asian)
  • Literary Studies (European)
  • Literary Studies (Eco-criticism)
  • Literary Studies (Modernism)
  • Literary Studies - World
  • Literary Studies (1500 to 1800)
  • Literary Studies (19th Century)
  • Literary Studies (20th Century onwards)
  • Literary Studies (African American Literature)
  • Literary Studies (British and Irish)
  • Literary Studies (Early and Medieval)
  • Literary Studies (Fiction, Novelists, and Prose Writers)
  • Literary Studies (Gender Studies)
  • Literary Studies (Graphic Novels)
  • Literary Studies (History of the Book)
  • Literary Studies (Plays and Playwrights)
  • Literary Studies (Poetry and Poets)
  • Literary Studies (Postcolonial Literature)
  • Literary Studies (Queer Studies)
  • Literary Studies (Science Fiction)
  • Literary Studies (Travel Literature)
  • Literary Studies (War Literature)
  • Literary Studies (Women's Writing)
  • Literary Theory and Cultural Studies
  • Mythology and Folklore
  • Shakespeare Studies and Criticism
  • Browse content in Media Studies
  • Browse content in Music
  • Applied Music
  • Dance and Music
  • Ethics in Music
  • Ethnomusicology
  • Gender and Sexuality in Music
  • Medicine and Music
  • Music Cultures
  • Music and Media
  • Music and Religion
  • Music and Culture
  • Music Education and Pedagogy
  • Music Theory and Analysis
  • Musical Scores, Lyrics, and Libretti
  • Musical Structures, Styles, and Techniques
  • Musicology and Music History
  • Performance Practice and Studies
  • Race and Ethnicity in Music
  • Sound Studies
  • Browse content in Performing Arts
  • Browse content in Philosophy
  • Aesthetics and Philosophy of Art
  • Epistemology
  • Feminist Philosophy
  • History of Western Philosophy
  • Metaphysics
  • Moral Philosophy
  • Non-Western Philosophy
  • Philosophy of Language
  • Philosophy of Mind
  • Philosophy of Perception
  • Philosophy of Science
  • Philosophy of Action
  • Philosophy of Law
  • Philosophy of Religion
  • Philosophy of Mathematics and Logic
  • Practical Ethics
  • Social and Political Philosophy
  • Browse content in Religion
  • Biblical Studies
  • Christianity
  • East Asian Religions
  • History of Religion
  • Judaism and Jewish Studies
  • Qumran Studies
  • Religion and Education
  • Religion and Health
  • Religion and Politics
  • Religion and Science
  • Religion and Law
  • Religion and Art, Literature, and Music
  • Religious Studies
  • Browse content in Society and Culture
  • Cookery, Food, and Drink
  • Cultural Studies
  • Customs and Traditions
  • Ethical Issues and Debates
  • Hobbies, Games, Arts and Crafts
  • Lifestyle, Home, and Garden
  • Natural world, Country Life, and Pets
  • Popular Beliefs and Controversial Knowledge
  • Sports and Outdoor Recreation
  • Technology and Society
  • Travel and Holiday
  • Visual Culture
  • Browse content in Law
  • Arbitration
  • Browse content in Company and Commercial Law
  • Commercial Law
  • Company Law
  • Browse content in Comparative Law
  • Systems of Law
  • Competition Law
  • Browse content in Constitutional and Administrative Law
  • Government Powers
  • Judicial Review
  • Local Government Law
  • Military and Defence Law
  • Parliamentary and Legislative Practice
  • Construction Law
  • Contract Law
  • Browse content in Criminal Law
  • Criminal Procedure
  • Criminal Evidence Law
  • Sentencing and Punishment
  • Employment and Labour Law
  • Environment and Energy Law
  • Browse content in Financial Law
  • Banking Law
  • Insolvency Law
  • History of Law
  • Human Rights and Immigration
  • Intellectual Property Law
  • Browse content in International Law
  • Private International Law and Conflict of Laws
  • Public International Law
  • IT and Communications Law
  • Jurisprudence and Philosophy of Law
  • Law and Politics
  • Law and Society
  • Browse content in Legal System and Practice
  • Courts and Procedure
  • Legal Skills and Practice
  • Primary Sources of Law
  • Regulation of Legal Profession
  • Medical and Healthcare Law
  • Browse content in Policing
  • Criminal Investigation and Detection
  • Police and Security Services
  • Police Procedure and Law
  • Police Regional Planning
  • Browse content in Property Law
  • Personal Property Law
  • Study and Revision
  • Terrorism and National Security Law
  • Browse content in Trusts Law
  • Wills and Probate or Succession
  • Browse content in Medicine and Health
  • Browse content in Allied Health Professions
  • Arts Therapies
  • Clinical Science
  • Dietetics and Nutrition
  • Occupational Therapy
  • Operating Department Practice
  • Physiotherapy
  • Radiography
  • Speech and Language Therapy
  • Browse content in Anaesthetics
  • General Anaesthesia
  • Neuroanaesthesia
  • Clinical Neuroscience
  • Browse content in Clinical Medicine
  • Acute Medicine
  • Cardiovascular Medicine
  • Clinical Genetics
  • Clinical Pharmacology and Therapeutics
  • Dermatology
  • Endocrinology and Diabetes
  • Gastroenterology
  • Genito-urinary Medicine
  • Geriatric Medicine
  • Infectious Diseases
  • Medical Toxicology
  • Medical Oncology
  • Pain Medicine
  • Palliative Medicine
  • Rehabilitation Medicine
  • Respiratory Medicine and Pulmonology
  • Rheumatology
  • Sleep Medicine
  • Sports and Exercise Medicine
  • Community Medical Services
  • Critical Care
  • Emergency Medicine
  • Forensic Medicine
  • Haematology
  • History of Medicine
  • Browse content in Medical Skills
  • Clinical Skills
  • Communication Skills
  • Nursing Skills
  • Surgical Skills
  • Browse content in Medical Dentistry
  • Oral and Maxillofacial Surgery
  • Paediatric Dentistry
  • Restorative Dentistry and Orthodontics
  • Surgical Dentistry
  • Medical Ethics
  • Medical Statistics and Methodology
  • Browse content in Neurology
  • Clinical Neurophysiology
  • Neuropathology
  • Nursing Studies
  • Browse content in Obstetrics and Gynaecology
  • Gynaecology
  • Occupational Medicine
  • Ophthalmology
  • Otolaryngology (ENT)
  • Browse content in Paediatrics
  • Neonatology
  • Browse content in Pathology
  • Chemical Pathology
  • Clinical Cytogenetics and Molecular Genetics
  • Histopathology
  • Medical Microbiology and Virology
  • Patient Education and Information
  • Browse content in Pharmacology
  • Psychopharmacology
  • Browse content in Popular Health
  • Caring for Others
  • Complementary and Alternative Medicine
  • Self-help and Personal Development
  • Browse content in Preclinical Medicine
  • Cell Biology
  • Molecular Biology and Genetics
  • Reproduction, Growth and Development
  • Primary Care
  • Professional Development in Medicine
  • Browse content in Psychiatry
  • Addiction Medicine
  • Child and Adolescent Psychiatry
  • Forensic Psychiatry
  • Learning Disabilities
  • Old Age Psychiatry
  • Psychotherapy
  • Browse content in Public Health and Epidemiology
  • Epidemiology
  • Public Health
  • Browse content in Radiology
  • Clinical Radiology
  • Interventional Radiology
  • Nuclear Medicine
  • Radiation Oncology
  • Reproductive Medicine
  • Browse content in Surgery
  • Cardiothoracic Surgery
  • Gastro-intestinal and Colorectal Surgery
  • General Surgery
  • Neurosurgery
  • Paediatric Surgery
  • Peri-operative Care
  • Plastic and Reconstructive Surgery
  • Surgical Oncology
  • Transplant Surgery
  • Trauma and Orthopaedic Surgery
  • Vascular Surgery
  • Browse content in Science and Mathematics
  • Browse content in Biological Sciences
  • Aquatic Biology
  • Biochemistry
  • Bioinformatics and Computational Biology
  • Developmental Biology
  • Ecology and Conservation
  • Evolutionary Biology
  • Genetics and Genomics
  • Microbiology
  • Molecular and Cell Biology
  • Natural History
  • Plant Sciences and Forestry
  • Research Methods in Life Sciences
  • Structural Biology
  • Systems Biology
  • Zoology and Animal Sciences
  • Browse content in Chemistry
  • Analytical Chemistry
  • Computational Chemistry
  • Crystallography
  • Environmental Chemistry
  • Industrial Chemistry
  • Inorganic Chemistry
  • Materials Chemistry
  • Medicinal Chemistry
  • Mineralogy and Gems
  • Organic Chemistry
  • Physical Chemistry
  • Polymer Chemistry
  • Study and Communication Skills in Chemistry
  • Theoretical Chemistry
  • Browse content in Computer Science
  • Artificial Intelligence
  • Computer Architecture and Logic Design
  • Game Studies
  • Human-Computer Interaction
  • Mathematical Theory of Computation
  • Programming Languages
  • Software Engineering
  • Systems Analysis and Design
  • Virtual Reality
  • Browse content in Computing
  • Business Applications
  • Computer Security
  • Computer Games
  • Computer Networking and Communications
  • Digital Lifestyle
  • Graphical and Digital Media Applications
  • Operating Systems
  • Browse content in Earth Sciences and Geography
  • Atmospheric Sciences
  • Environmental Geography
  • Geology and the Lithosphere
  • Maps and Map-making
  • Meteorology and Climatology
  • Oceanography and Hydrology
  • Palaeontology
  • Physical Geography and Topography
  • Regional Geography
  • Soil Science
  • Urban Geography
  • Browse content in Engineering and Technology
  • Agriculture and Farming
  • Biological Engineering
  • Civil Engineering, Surveying, and Building
  • Electronics and Communications Engineering
  • Energy Technology
  • Engineering (General)
  • Environmental Science, Engineering, and Technology
  • History of Engineering and Technology
  • Mechanical Engineering and Materials
  • Technology of Industrial Chemistry
  • Transport Technology and Trades
  • Browse content in Environmental Science
  • Applied Ecology (Environmental Science)
  • Conservation of the Environment (Environmental Science)
  • Environmental Sustainability
  • Environmentalist Thought and Ideology (Environmental Science)
  • Management of Land and Natural Resources (Environmental Science)
  • Natural Disasters (Environmental Science)
  • Nuclear Issues (Environmental Science)
  • Pollution and Threats to the Environment (Environmental Science)
  • Social Impact of Environmental Issues (Environmental Science)
  • History of Science and Technology
  • Browse content in Materials Science
  • Ceramics and Glasses
  • Composite Materials
  • Metals, Alloying, and Corrosion
  • Nanotechnology
  • Browse content in Mathematics
  • Applied Mathematics
  • Biomathematics and Statistics
  • History of Mathematics
  • Mathematical Education
  • Mathematical Finance
  • Mathematical Analysis
  • Numerical and Computational Mathematics
  • Probability and Statistics
  • Pure Mathematics
  • Browse content in Neuroscience
  • Cognition and Behavioural Neuroscience
  • Development of the Nervous System
  • Disorders of the Nervous System
  • History of Neuroscience
  • Invertebrate Neurobiology
  • Molecular and Cellular Systems
  • Neuroendocrinology and Autonomic Nervous System
  • Neuroscientific Techniques
  • Sensory and Motor Systems
  • Browse content in Physics
  • Astronomy and Astrophysics
  • Atomic, Molecular, and Optical Physics
  • Biological and Medical Physics
  • Classical Mechanics
  • Computational Physics
  • Condensed Matter Physics
  • Electromagnetism, Optics, and Acoustics
  • History of Physics
  • Mathematical and Statistical Physics
  • Measurement Science
  • Nuclear Physics
  • Particles and Fields
  • Plasma Physics
  • Quantum Physics
  • Relativity and Gravitation
  • Semiconductor and Mesoscopic Physics
  • Browse content in Psychology
  • Affective Sciences
  • Clinical Psychology
  • Cognitive Psychology
  • Cognitive Neuroscience
  • Criminal and Forensic Psychology
  • Developmental Psychology
  • Educational Psychology
  • Evolutionary Psychology
  • Health Psychology
  • History and Systems in Psychology
  • Music Psychology
  • Neuropsychology
  • Organizational Psychology
  • Psychological Assessment and Testing
  • Psychology of Human-Technology Interaction
  • Psychology Professional Development and Training
  • Research Methods in Psychology
  • Social Psychology
  • Browse content in Social Sciences
  • Browse content in Anthropology
  • Anthropology of Religion
  • Human Evolution
  • Medical Anthropology
  • Physical Anthropology
  • Regional Anthropology
  • Social and Cultural Anthropology
  • Theory and Practice of Anthropology
  • Browse content in Business and Management
  • Business Ethics
  • Business Strategy
  • Business History
  • Business and Technology
  • Business and Government
  • Business and the Environment
  • Comparative Management
  • Corporate Governance
  • Corporate Social Responsibility
  • Entrepreneurship
  • Health Management
  • Human Resource Management
  • Industrial and Employment Relations
  • Industry Studies
  • Information and Communication Technologies
  • International Business
  • Knowledge Management
  • Management and Management Techniques
  • Operations Management
  • Organizational Theory and Behaviour
  • Pensions and Pension Management
  • Public and Nonprofit Management
  • Strategic Management
  • Supply Chain Management
  • Browse content in Criminology and Criminal Justice
  • Criminal Justice
  • Criminology
  • Forms of Crime
  • International and Comparative Criminology
  • Youth Violence and Juvenile Justice
  • Development Studies
  • Browse content in Economics
  • Agricultural, Environmental, and Natural Resource Economics
  • Asian Economics
  • Behavioural Finance
  • Behavioural Economics and Neuroeconomics
  • Econometrics and Mathematical Economics
  • Economic History
  • Economic Systems
  • Economic Methodology
  • Economic Development and Growth
  • Financial Markets
  • Financial Institutions and Services
  • General Economics and Teaching
  • Health, Education, and Welfare
  • History of Economic Thought
  • International Economics
  • Labour and Demographic Economics
  • Law and Economics
  • Macroeconomics and Monetary Economics
  • Microeconomics
  • Public Economics
  • Urban, Rural, and Regional Economics
  • Welfare Economics
  • Browse content in Education
  • Adult Education and Continuous Learning
  • Care and Counselling of Students
  • Early Childhood and Elementary Education
  • Educational Equipment and Technology
  • Educational Strategies and Policy
  • Higher and Further Education
  • Organization and Management of Education
  • Philosophy and Theory of Education
  • Schools Studies
  • Secondary Education
  • Teaching of a Specific Subject
  • Teaching of Specific Groups and Special Educational Needs
  • Teaching Skills and Techniques
  • Browse content in Environment
  • Applied Ecology (Social Science)
  • Climate Change
  • Conservation of the Environment (Social Science)
  • Environmentalist Thought and Ideology (Social Science)
  • Natural Disasters (Environment)
  • Social Impact of Environmental Issues (Social Science)
  • Browse content in Human Geography
  • Cultural Geography
  • Economic Geography
  • Political Geography
  • Browse content in Interdisciplinary Studies
  • Communication Studies
  • Museums, Libraries, and Information Sciences
  • Browse content in Politics
  • African Politics
  • Asian Politics
  • Chinese Politics
  • Comparative Politics
  • Conflict Politics
  • Elections and Electoral Studies
  • Environmental Politics
  • European Union
  • Foreign Policy
  • Gender and Politics
  • Human Rights and Politics
  • Indian Politics
  • International Relations
  • International Organization (Politics)
  • International Political Economy
  • Irish Politics
  • Latin American Politics
  • Middle Eastern Politics
  • Political Behaviour
  • Political Economy
  • Political Institutions
  • Political Methodology
  • Political Communication
  • Political Philosophy
  • Political Sociology
  • Political Theory
  • Politics and Law
  • Public Policy
  • Public Administration
  • Quantitative Political Methodology
  • Regional Political Studies
  • Russian Politics
  • Security Studies
  • State and Local Government
  • UK Politics
  • US Politics
  • Browse content in Regional and Area Studies
  • African Studies
  • Asian Studies
  • East Asian Studies
  • Japanese Studies
  • Latin American Studies
  • Middle Eastern Studies
  • Native American Studies
  • Scottish Studies
  • Browse content in Research and Information
  • Research Methods
  • Browse content in Social Work
  • Addictions and Substance Misuse
  • Adoption and Fostering
  • Care of the Elderly
  • Child and Adolescent Social Work
  • Couple and Family Social Work
  • Developmental and Physical Disabilities Social Work
  • Direct Practice and Clinical Social Work
  • Emergency Services
  • Human Behaviour and the Social Environment
  • International and Global Issues in Social Work
  • Mental and Behavioural Health
  • Social Justice and Human Rights
  • Social Policy and Advocacy
  • Social Work and Crime and Justice
  • Social Work Macro Practice
  • Social Work Practice Settings
  • Social Work Research and Evidence-based Practice
  • Welfare and Benefit Systems
  • Browse content in Sociology
  • Childhood Studies
  • Community Development
  • Comparative and Historical Sociology
  • Economic Sociology
  • Gender and Sexuality
  • Gerontology and Ageing
  • Health, Illness, and Medicine
  • Marriage and the Family
  • Migration Studies
  • Occupations, Professions, and Work
  • Organizations
  • Population and Demography
  • Race and Ethnicity
  • Social Theory
  • Social Movements and Social Change
  • Social Research and Statistics
  • Social Stratification, Inequality, and Mobility
  • Sociology of Religion
  • Sociology of Education
  • Sport and Leisure
  • Urban and Rural Studies
  • Browse content in Warfare and Defence
  • Defence Strategy, Planning, and Research
  • Land Forces and Warfare
  • Military Administration
  • Military Life and Institutions
  • Naval Forces and Warfare
  • Other Warfare and Defence Issues
  • Peace Studies and Conflict Resolution
  • Weapons and Equipment

Managing Computer Viruses

  • < Previous chapter

Managing Computer Viruses

7 Conclusion

  • Published: August 1992
  • Cite Icon Cite
  • Permissions Icon Permissions

In Chapter 1 we set specific objectives for this book. It is appropriate at this stage to consider how these objectives have been met. The overriding purpose was to take a management view of computer viruses, since this does not appear to have been done and the importance of doing so is crucial to any meaningful attempt to counter the virus threat. How well this has been accomplished is best judged by management readers. A review of the other objectives follows. 1. To present a concise but comprehensive account of what is known about computer viruses. This was done mostly in Chapter 2, where the nature of computer viruses was explained and various aspects of the problem were discussed.

Signed in as

Institutional accounts.

  • GoogleCrawler [DO NOT DELETE]
  • Google Scholar Indexing

Personal account

  • Sign in with email/username & password
  • Get email alerts
  • Save searches
  • Purchase content
  • Activate your purchase/trial code
  • Add your ORCID iD

Institutional access

Sign in with a library card.

  • Sign in with username/password
  • Recommend to your librarian
  • Institutional account management
  • Get help with access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Sign in through your institution

Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  • Click Sign in through your institution.
  • Select your institution from the list provided, which will take you to your institution's website to sign in.
  • When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  • Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  • Click Sign in through society site.
  • When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

Our books are available by subscription or purchase to libraries and institutions.

  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Rights and permissions
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Home — Essay Samples — Information Science and Technology — Computer — Computer Viruses

test_template

Computer Viruses

  • Categories: Computer Viruses

About this sample

close

Words: 1837 |

10 min read

Published: Jan 29, 2019

Words: 1837 | Pages: 4 | 10 min read

Table of contents

The anna kournikova worm, the melissa virus, crypto locker.

Image of Alex Wood

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Verified writer

  • Expert in: Information Science and Technology Science

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

3 pages / 1378 words

1 pages / 660 words

2 pages / 1111 words

5 pages / 2111 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Internet of Things (IoT) is a system of integrated technology that authorizes interaction of distinctively connected computing devise which could be rooted with other interfaces like humans or machines, associated via wired and [...]

The ASUS VivoBook F510UA FHD is a laptop with nice esthetics and a solid feature set, easily rivaling some of its premium competitors. The design and build quality of the laptop are really good. It’s easily one of the best [...]

It was a time when personal computer was a set consisting of monitor and single choice of technology, but it wasn’t good like using only one thing on technology. And after that was a revolutionary change of different computing [...]

Fortnite has undoubtedly risen to become one of the most popular ongoing games. It has become a cult in itself and has been able to attract crowds from multiple age brackets into this super engrossing video game. The game was [...]

Technology has become one of the most important tools today in our daily life. Every year important teams of engineers and technicians work in the development of new technologies and ways to make our lives and jobs easier. It’s [...]

For any linear program (LP) it is possible to formulate a partner LP using the same data, and the solution to either the original LP (the primal) or the partner (the dual) provides the same information about the problem being [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

conclusion of computer virus essay

ESSAY SAUCE

ESSAY SAUCE

FOR STUDENTS : ALL THE INGREDIENTS OF A GOOD ESSAY

Essay: The History and Types of Computer Viruses and Their Effects

Essay details and download:.

  • Subject area(s): Essay examples
  • Reading time: 4 minutes
  • Price: Free download
  • Published: 5 December 2019*
  • File format: Text
  • Words: 987 (approx)
  • Number of pages: 4 (approx)

Text preview of this essay:

This page of the essay has 987 words. Download the full version above.

INTRODACTION: –

A computer virus is a program that spread to affect executable files or around the disk network hard drive  and then making copies of itself. Some virus are not dangerous,  others may harm data files, and others could break down the files. Simply the virus is a computer program that could do anything to other programs that its run and damage it. Viruses are transferred when people divide USB (Universal Serial Bus) or it could transfer from discs and any portable media that could be useful for Computers. Nowadays viruses could be found  on the website or even in emails, it could spread through the massages. Viruses can be formed as a PDF file (Portable Document Format) many of them actually  could be as a funny image or audio and video files. That's what make the people should be more careful with their own private information that could exist on the hard disk. Computer viruses have a history also different types and effects on the computer's data.

I-  THE HISTORY OF COMPUTER VIRUSES

This section will mentions the first computer virus  released and what happened next

A.  First computer virus

Brain is the name of the first computer virus in history released in January 1986. Written by two brothers  Amjad Faroog Alvi and Basit Faroog Alvi from Pakistan. The computer virus Brain didn’t  actually has any effects, however Brain had made to scan the IBM PC ,  and make a copy of it by putting  back  the  boot sector of a floppy disk . Also, the virus develops to check if there is any mistake could happen to the Disk Operating System. This varies made a lot of people develop a new computer viruses that is harmed and danger.

B. What happened after the computer virus Brain was released ?

After the computer virus brain was released, millions of new  computer viruses  have  spread around the world. Most of these new viruses are dangerous which made our network world unsafe   and harmful.  However,  the risk of these computer viruses is made by people who like to to steal  personal information  and destroy data are called hackers.  The hackers made a set of dangers types of computer viruses this site does a lot of cost in our network world. That's what makes the network world unsafe and harmful which is really bad for the society.  

II- TYPES OF COMPUTER  VIRUSES

This section will discuss the types, and the most harmful computer viruses.

A. Types of computer viruses

There are a lot of types of computer viruses that is dangerous. One of them, is  the Trojan horse which is the kind of  program that  is hiding a virus inside  and harm programs that is working in the computer. In fact, a Trojan horse is  running more than one program at the same time, which is affecting the work of the computer. Trojan horse could be found when people download a free software or  attachment in the email messages. Another ,type is the internet worm virus  that is spread across the network world by copying itself on computers . The worm virus steals information and data.

B. Most dangerous kind of computer viruses  and their  cost damaged

First, is computer virus called ILOVEYOU  it is from a text email messages as a file this virus cost around 10 billion dollars  damage . Second , is Mydoom virus this virus has cost a 38.5 billion dollars as second part of ILOVEYOU virus. Third, is a trojan virus named Zeus has stolen over 70 million dollars from banks. Last, a virus called Slammer this virus attack random IP address and ATM , cost 1.2 billion dollars of damage. Also, there are more harmful viruses have existed.

III- THE EFFECTS OF COMPUTER VIRUSES

This section will describe the effects of  computer viruses

A. The way of computer viruses to steal information

Computer viruses could do harm things to the computer and data for example stealing private information. Every day a lot of private information stolen by hackers, who create a virus that is designed to steal peoples' data .

B. Computer viruses and their effects to hard drives

The danger of computer viruses cost a lot important data like the hard drives . One of these viruses is designed to erase or destroy computer hard drives. However, these damaged cost a lot of  money, important data for big companies and people .

C. A kind of computer virus could stop, the computer work

There is a kind of computer virus that affect the power supply. This virus shuts down or stop the work of computer immediately without any warning .Also, this virus  slows the computer which can damage some parts.

D. Damaged parts of the computer

Sometimes computer virus could destroy some parts of the computer. One of the parts called motherboard which is the most important part. This part is responsible for all the  pieces of the computer.

 People should be more careful with their own data information. There are a lot of ways to protect the computer from virus . One of many ways is  the firewall should be turned on all the time. This firewall protects your computer from hackers who might try to access your IP address and search for the important data to steal it or erase it. Another way to protect the computer from virus is to install a program called antivirus this program is a software designed to  prevent attacks from other harmful programs. Antivirus could update automatically that what make antivirus a good way to protect . People should be more careful when they download anything from the website or open any email messages  that is strange to prevent any hacker  attack that could be dangerous. Also, to avoid any attack from hackers people should  scan their privet  computer from time to time this way is very helpful move against computer viruses .  People should take care from any suspicions to prevent the danger of computer viruses.

...(download the rest of the essay above)

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, The History and Types of Computer Viruses and Their Effects . Available from:<https://www.essaysauce.com/essay-examples/essay-2016-05-01-000b0q/> [Accessed 20-05-24].

These Essay examples have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on Essay.uk.com at an earlier date.

Essay Categories:

  • Accounting essays
  • Architecture essays
  • Business essays
  • Computer science essays
  • Criminology essays
  • Economics essays
  • Education essays
  • Engineering essays
  • English language essays
  • Environmental studies essays
  • Essay examples
  • Finance essays
  • Geography essays
  • Health essays
  • History essays
  • Hospitality and tourism essays
  • Human rights essays
  • Information technology essays
  • International relations
  • Leadership essays
  • Linguistics essays
  • Literature essays
  • Management essays
  • Marketing essays
  • Mathematics essays
  • Media essays
  • Medicine essays
  • Military essays
  • Miscellaneous essays
  • Music Essays
  • Nursing essays
  • Philosophy essays
  • Photography and arts essays
  • Politics essays
  • Project management essays
  • Psychology essays
  • Religious studies and theology essays
  • Sample essays
  • Science essays
  • Social work essays
  • Sociology essays
  • Sports essays
  • Types of essay
  • Zoology essays
  • First Online: 28 November 2023

Cite this chapter

conclusion of computer virus essay

  • Tharun Dolla 4 ,
  • Ganesh Devkar 5 &
  • Boeing Laishram 6  

Part of the book series: Contributions to Public Administration and Public Policy ((CPAPP))

69 Accesses

In December 2019, the Covid-19 pandemic has thrown life out of gear across the world. While writing this chapter, the world has experienced waves of Covid-19 infections, and threats of new virus mutations and deadlier infections still loom at large. As the infrastructure is an underlying fabric, like veins and blood in a human body, on which society and nation prospers, like human body, it too got disrupted owing to Covid-19. This disruption has forced the policy makers and stakeholders associated with the infrastructure delivery process to rethink the entire value chain of right from planning, design, construction to operation of created facility. The extent of “disruption” became a point of debate owing to perception about the “infrastructure” that it is created by keeping in mind the long horizon (of time) and it is expected to have resilience, adaptability, agility, and responsiveness built it in. Few stakeholders termed it as a “black swan event” and tried to discuss it under the cloud of “uncertainty” and “one of off” phenomena. However, many stakeholders kept themselves away from coining Covid-19 as “Unknown” event because human civilization has experienced pandemics in the past and opened healthy debates on how the infrastructure delivery process responded in the times of Covid-19 and what are the areas of improvements to be made in the process to deal with disruptions of similar nature. The infrastructure is shaped and delivered to the customers under the influence of and interaction with varied elements like infrastructure policies, laws and regulations, contractual agreement, design drivers, financing mechanisms, and community consultation process. As each country has a different set of elements in force, the quality and quantity of emergent infrastructure and the service delivered are different. The Covid-19 pandemic unearthed these facets of infrastructure, especially in the delivery of healthcare services. Even it may be apt to say that the Covid-19 pandemic opened the can of worms, and debates raged over the process followed for financial allocation of different infrastructure sectors, policy measures undertaken by the governments to address the infrastructure backlog, accessibility of infrastructure to poor and marginalized communities, measures to reduce carbon footprint of existing, and planned infrastructure. Among these issues, the policy makers and news media were keenly observing and scrutinizing the infrastructure which is created and delivered with Public-Private Partnership (PPP) model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

https://infrascope.eiu.com/country-reports/

Author information

Authors and affiliations.

Department of Civil Engineering, Indian Institute of Technology Bombay, Mumbai, Maharashtra, India

Tharun Dolla

Faculty of Technology, CEPT University, Ahmedabad, Gujarat, India

Ganesh Devkar

Department of Civil Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India

Boeing Laishram

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Tharun Dolla .

Editor information

Editors and affiliations, rights and permissions.

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Dolla, T., Devkar, G., Laishram, B. (2023). Conclusion. In: Dolla, T., Laishram, B., Devkar, G. (eds) Revisiting Public-Private Partnerships. Contributions to Public Administration and Public Policy. Springer, Cham. https://doi.org/10.1007/978-3-031-37015-1_16

Download citation

DOI : https://doi.org/10.1007/978-3-031-37015-1_16

Published : 28 November 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-37014-4

Online ISBN : 978-3-031-37015-1

eBook Packages : Economics and Finance Economics and Finance (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. Intro To Computer Virus Essay

    conclusion of computer virus essay

  2. Computer Virus

    conclusion of computer virus essay

  3. Sources Of Computer Virus Free Essay Example

    conclusion of computer virus essay

  4. Computer Virus

    conclusion of computer virus essay

  5. Computer Viruses vs. Biological Viruses Essay Example

    conclusion of computer virus essay

  6. 🌈 Essay on computer virus. Essay about Computer Viruses. 2022-11-02

    conclusion of computer virus essay

VIDEO

  1. Conclusion

  2. Conclusion

  3. Conclusion

  4. Conclusion

  5. VIRUS TYPES !! ANTIVIRUS !! COMPUTER !!SHORT QUESTIONS !! SOLUTIONS !! FOR ALL STUDENTS&INTERVIEWS

  6. Conclusion

COMMENTS

  1. Computer Viruses

    The hackers who design most common computer viruses usually come up with the names (US-CERT, 2012). Some of these viruses include Melissa, the Anna Kournikova, MyDoom, Sasser & Netsky, the ILOVEYOU virus, The Klez Virus, Code Red and Code Red II, Nimda virus, SQL Slammer/Sapphire virus, Leap-A/Oompa-A virus, and Storm Worm (US-CERT, 2012).

  2. (PDF) The Impact of Computer Virus

    Conclusions and Recommendations ... This document focuses on papers that give information about techniques and systems detecting malicious code. ... A computer virus is a program that can infect ...

  3. Computer virus

    computer virus, a portion of a computer program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy data and program code or, in the case of ransomware, to extort payment. A virus consists of a set of ...

  4. Computer Viruses, Their Types and Prevention Research Paper

    A worm is a self-replicating virus that focuses on creating adverse effects on your computer. This can consist of deleting critical system files, overwriting program protocols, and taking up valuable CPU processing space. Worm infections are identifiable based on process errors happening all of a sudden as well as a noticeable decline in the ...

  5. An introduction to computer viruses: Problems and solutions

    or copy data from computer to computer. viruses can be transmitted via computer. syste ms, an inte rnal network or the. internet. Once a computer system gets. infected with a virus, the data ...

  6. Essay on Computer Viruses and How to Protect Against Them

    Boot sector virus: all computes have a boot program and that is run when the computer is starting. Boot sector viruses are infected to boot program on the hard drive, files, pen drive, floppy disk, etc. Boot sector virus is joining with the drive and it is run when computer user trying to start the computer. For example, disk killer, stoned.

  7. The Prevention Of Computer Viruses Computer Science Essay

    As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses.

  8. Viruses And Antivirus Computer Science Essay

    5- To keep multiple backup copies of all your files before installing any new programs. 6- Processing computer with an anti-virus and always updated to ensure that detect new viruses. 7- Always updated operating system and support it by the windows defender .

  9. Introduction of Computer Virus

    Introduction of Computer Virus. Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus also can be spread by via disk, CD, thauDVD or ...

  10. Different Kinds of Computer Viruses: Their Creation ...

    A computer virus, as stated by Xiaofan Yang and Lu-Xing Yang in their paper entitled "Towards the Epidemiological Modeling of Computer Viruses" is, "a malicious program that can replicate itself and spread from computer to computer…a virus can perform devastating operations such as modifying data, deleting data, deleting files, encrypting files, and formatting disks" (Yang).

  11. Computer Viruses Essays: Examples, Topics, & Outlines

    Some examples include: Using a computer and peripherals for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink. Stealing a laptop computer with proprietary information is the same crime as stealing a briefcase that contains papers with proprietary…. Works Cited Read More.

  12. computer viruses essay

    Computer Viruses And Its Effects On A Computer System. A computer virus is a malware program that, when executed copies itself into other data files, computer programs, or the boot sector of the hard drive with 95% of viruses doing no more than that. (1) (2). A virus might attach itself to a program such as a word document program.

  13. Essays About Computer Virus ️ Free Examples & Essay Topic Ideas

    Essays on Computer Virus. Free essays on computer virus provide detailed information on the different types of computer viruses, their characteristics, and how they can harm computers. These essays explain the ways in which computer viruses spread, the symptoms of a virus infection, and measures that can be taken to prevent and eliminate viruses.

  14. Solutions to Computer Viruses

    Examples of antivirus software include Kaspersky, McAfee, Norton, Avast etcetera. The only down side of antivirus software is that they are also programs and thus they are not intrinsically perfect. The antivirus software is thus frequently updated in order for it to efficiently protect a computer system (Brain 1).

  15. Essay on Antivirus

    In conclusion, antivirus is a vital tool for keeping our computers safe. It works by scanning for known viruses and watching for suspicious activity. Without it, our personal information and files could be at risk. So, it's important to always have an up-to-date antivirus program on your computer. 500 Words Essay on Antivirus What is Antivirus?

  16. Conclusion

    A review of the other objectives follows. 1. To present a concise but comprehensive account of what is known about computer viruses. This was done mostly in Chapter 2, where the nature of computer viruses was explained and various aspects of the problem were discussed. Keywords: senior managers, technical managers.

  17. Computer Viruses: [Essay Example], 1837 words GradesFixer

    Chernobyl. CIH, also known as Chernobyl or Space filler, is a Microsoft Windows 9x computer virus which first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives, and in some cases destroying the system BIOS. The virus was created by Chen Ing-hau, pinyin: Chén ...

  18. Ethical Implications of Computer Virus'

    A computer virus is a program that executes when an infected program is executed. It is capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate.

  19. Essay: The History and Types of Computer Viruses and Their Effects

    First, is computer virus called ILOVEYOU it is from a text email messages as a file this virus cost around 10 billion dollars damage . Second , is Mydoom virus this virus has cost a 38.5 billion dollars as second part of ILOVEYOU virus. Third, is a trojan virus named Zeus has stolen over 70 million dollars from banks.

  20. The Benefits Of Antivirus Protection

    The Antivirus (or anti-virus) software is a program that used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. These software scan throw the PC of the computer looking for viruses to remove it before the virus ...

  21. Introduction of Computer Virus

    Introduction of Computer Virus. Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus also can be spread by via disk, CD, thauDVD or ...

  22. Conclusion

    While writing this chapter, the world has experienced waves of Covid-19 infections, and threats of new virus mutations and deadlier infections still loom at large. As the infrastructure is an underlying fabric, like veins and blood in a human body, on which society and nation prospers, like human body, it too got disrupted owing to Covid-19.

  23. Conclusion of computer virus Free Essays

    SOURCES OF COMPUTER VIRUS Virus infection in Computers can be contacted through different means. Below are the commonest causes of Computer Virus attack. 1. Through the internet: The easiest and quickest means of spreading Computer Virus is through the internet. Basically through downloaded files and documents.