Introduction to Computer Hardware Assignment — Computer Virus

123456789101112131415161718
Across
  1. 6. A program that changes a person’s computer browsing settings (i.e. adding extensions to browsers). Such changes will redirect the user to internet sites that they have no intention of visiting.
  2. 9. A virus that hide in RAM and would typically install themselves into the computer’s memory.
  3. 12. A virus that attacks the file allocation table (FAT) and can result in severe damage to a computer.
  4. 14. A program that gathers and steals information about a user (i.e. their passwords, interests, personal information) through the monitoring of their browsing activities (i.e. their history). This information can be saved so that it can be recovered on a later date. The invasive tracking that this type of program does is not always done with the user knowing.
  5. 15. Irrelevant messages sent to a large group of people over the internet.
  6. 16. A virus that is contained within and transmitted via the opening of an attachment (an attached document) of an e-mail.
  7. 17. A flaw in a program.
  8. 18. Usually used to harm a user’s computer system, this virus modifies or completely changes one of a computer’s macro, a piece of code that is also a set of instructions that would automatically expand into a more extensive set of commands that will lead to the performance of a certain task. (It will cause a sequence of actions to be performed automatically).
Down
  1. 1. Any defects, or “weak” spots found in a program that are often advantageously used by viruses as a way to infect a system.
  2. 2. This virus does not alter any files but instead will create a copy of the file and will place a different extension on it. (i.e. .com)
  3. 3. A virus that changes its binary signature, the unique code that identifies a document, every time it damages a new file.
  4. 4. A virus that affects a computer’s entire directory system by changing the path that specifies the location of files. Typically located in a disk.
  5. 5. A virus that is often spread from one system to another through an e-mail or website that has been hacked. At times, this virus can be attached to legitimate files and can be spread when a user launches a specific program. The user is typically unaware that there is a virus attached.
  6. 6. A common consequence of pirated content, this infector is a virus that will damage the hard drive or floppy disk. Typically transmitted through the floppy disk of those already infected, this virus has the ability to go undetected by the system and the user, as well as alter the storage drive’s volume label.
  7. 7. Often invisible to the user, this virus can duplicate and occur in a system’s recently used (Active) memory. Despite its self replicating nature, it doesn’t modify any files.
  8. 8. A virus that takes place due to the misuse of a website’s code that can then follow through to infecting a computer. This virus often occurs due to code being placed into a site without the website’s technician knowing.
  9. 9. A virus that infects a system using a combination of characteristics of multiple types of viruses. This virus can be quite difficult to eliminate, and unless is completely gotten rid of, will frequently reinfect the system.
  10. 10. A virus that will, by overwriting files with its own code, completely take over and disrupt a program’s original code.
  11. 11. A program that is able to copy or load itself into a computer system and run against the user’s wishes, often by causing damage to the computer by discarding data or corrupting the system.
  12. 13. A program that contains harmful code in what appears to be harmless data, but can actually gain control and infect with its chosen form of damage, such as the appearance of unwanted pop ups. This virus often results after downloading pirated files.