Computer Science, asked by 10rishu, 3 months ago

program viruses infect program files with extensions such as
. COM . exe . sys all of these

Answers

Answered by kanavsharma705
15

Answer:

Answer is all of these

Explanation:

im class 6 answering wuestion which are always correct so pls consider marking and voting me :)

Answered by samahad
6

Answer:

DEFINITIONS OF VIRUSES AND OTHER COMPUTER "VERMIN"

Computer Virus - term was first used by Fred Cohen in 1984. A computer virus is a small program that attaches itself to another program and attacks other software by making copies of itself.

TYPES OF VIRUSES

Boot sector infector - hides in the boot sector of a disk or the partition table of a hard disk and takes over control of the computer system when it is booted. It then copies itself into the computer's memory. When other disks are used, the virus transfers to their boot sectors. The most common boot sector viruses are the Pakistani Brain virus and the Stoned/Marijuana virus.

Appliciation program infector - The most infectious type of computer viruses is the application program infector or file virus. They may attach to any executable file usually .COM and .EXE files. An application program infector takes control after the initial use of the infected program. Once the virus is in place in the RAM of the computer system, it will potentially infect every program run on the computer until the computer is shut off.

Dark Avenger Mutation Engine - polymorphic encryption program used by virus developers to encrypt the virus in order to avoid detection. The engine uses a special algorithm to generate a completely variable decryption routine each time. No three bytes remain constant from one sample to the next.

Multiparite virus - virus which infects both the boot sector of a disk as well as application programs.

Macro viruses - virus which attaches to a wordprocessing or spreadsheet file (typically a MS Word or Excel file) as a macro. Once the file is accessed, it replaces one of the Word or Excel standard macros with an infected version which can than infect all subsequent documents. Many of these are now spread via e-mail where the virus is activated when an e-mail attachment containing the virus is opened.

Similar questions