-
Right. Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period.
A computer virus is a program, a piece of executable code, which, like a biological virus, has the characteristics of a biological virus such as self-propagation, mutual infection, and activation and regeneration. Computer viruses have the ability to replicate, they can spread quickly, and they are often difficult to **. They can attach themselves to all types of files, and they spread along with the files when they are copied or transferred from one user to another.
-
A procedure that is easily contagious.
A computer virus is a program that executes code. Just like biological viruses, they have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation and regeneration.
Computer viruses have a strong concealment, a small number can be checked out by virus software, concealed computer viruses appear from time to time, changes Qingchahuai is not bright, this kind of virus is very difficult to deal with.
Artificial intelligence is an inevitable trend in the future. Modern computers have powerful functions and running speeds, but compared with the human brain, their intelligence and logical ability still need to be improved.
China has now become a major manufacturer of electronic information products, and has gradually established an important position in the global industrial division of labor system, and China's computer industry will show six major development trends in the future.
-
Answer]: In order to prevent the infection of computer viruses, the main measures are: Regularly back up common data and system software; Do not use programs that are illegally copied, decrypted, or from unknown sources; Regular testing, timely disinfection, and avoid toxic operations; Update the version of the virus removal software in a timely manner.
-
The contagiousness of a computer virus refers to the ability of a computer virus to spread and infect other computers and files in a computer system.
Computer viruses are classified according to the mode of infection of the virus:
1) File virus: File virus refers to a computer virus that can infect files and spread through infected files. The main files infected by this virus are executable files (with extensions c0m, exe, etc.) and text files (with extensions doc, xls, etc.).
2) System boot virus: This type of virus hides in the boot area of the hard disk or floppy disk, and the boot zone virus will start when the computer boots from the hard disk or floppy disk infected with the boot zone virus, or when the computer reads data from the infected disk.
3) Mixed virus: Mixed virus combines the characteristics of system-guided and file-based viruses, and its harm is more serious than that of system-guided and file-type viruses. This virus not only infects the system boot area, but also infects files, and through these two ways, it increases the infectivity and survival rate of the virus.
4) Macro virus: Macro virus is a computer virus that is stored in the macro of a document or template, which mainly uses the macro function provided by Microsor Word to bring the virus into the doc document with macros.
-
The possible ways for a computer to be infected with viruses are the spread of non-removable computer hardware devices, the spread of removable storage devices, the spread of networks, and the running of infected files, cyber attacks.
1. Propagation of immovable computer hardware equipment.
For example, the use of special integrated circuit chips for transmission, although this kind of computer virus is very rare, but the destructive power is extremely strong, there is no better detection hand or object section to deal with.
2. Mobile storage device propagation.
For example, it is distributed through removable disks including floppy disks, CD-ROMS, ZIP and JAZ disks. Among them, the soft Zhengdan disk is a widely used and frequently moved storage medium, so it has also become a "hotbed" for computer virus parasitism. Pirated software and games on CD-ROMs and illegal copies are also the main ways to spread computer viruses.
With the widespread use of large-capacity removable storage devices such as zip disks, rewritable optical discs, magneto-optical discs, etc., these storage media will also become a place for computer virus parasitism.
3. Network communication.
For example, a network is made up of a group of computers connected to each other, which is the need for data sharing and mutual cooperation. Each computer that makes up the network can connect to other computers, and data can be sent from one computer to another. If the sent data is infected with a computer virus, the recipient's computer is automatically infected, and as a result, it is possible to infect the entire network in a very short period of time.
<>5. Cyber attacks.
For example, cyber attacks are used to infect computers through network ports and services. A cyber attack is any type of offensive action that targets a computer information system, infrastructure, computer network, or personal computer equipment.
A computer virus is a computer virus that compiles or inserts into a computer program that destroys computer functionality or destroys data, affects the use of a computer, and is capable of self-replication. Destructive, replicable and contagious.
Hello for the computer virus is not a sentence can be finished, the important thing about the virus is the time when you are in the next something, the software has some virus files, after the computer is infected with the virus, for example, the speed of booting is significantly slower than the previous one, and the reason why you can't turn on the boot is related to the virus, if you want your computer not to plant a virus, first clean up the junk files in your computer, and then in the latest version of [antivirus software] such as 360 antivirus software 360 Security Guard to achieve a two-pronged effect [360 Security Guard] is mainly used for the computer's junk file cleaning and some file updates, 360 antivirus software is the tool used to kill Trojans.
A computer virus refers to a set of computer instructions or programs that are compiled or inserted into a computer program that destroys computer functions or destroys data, affects the use of the computer, and can replicate itself. Bi Ju Chun. >>>More
Latent, hidden, destructive, contagious, and secondary.
1, and then the antivirus method is one. >>>More
a.No bodily injury to computer operators.
b.It can cause infection and illness in all computer operators. >>>More