answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

500 Questions

Can a virus corrupt a peripheral through a computer?

User Avatar

Asked by Wiki User

Yes, it is possible for a virus to corrupt a peripheral device connected to a computer if the virus targets the device drivers or firmware of that peripheral. The virus could potentially cause the peripheral to malfunction or cease functioning altogether. It is important to have up-to-date antivirus software and practice safe computing habits to reduce the risk of this happening.

What is the common methods used to commit a computer crime?

User Avatar

Asked by Wiki User

Common methods used to commit computer crimes include phishing attacks to steal sensitive information, malware that infects computers to steal data or disrupt operations, and social engineering tactics to manipulate individuals into disclosing confidential information or granting access to systems.

What are the advantages of computer crime?

User Avatar

Asked by Wiki User

There are no advantages to computer crime. It is illegal, unethical, and can have serious consequences for victims and perpetrators. It undermines trust in technology and can lead to financial losses, identity theft, and privacy breaches.

What are the different functions of layout?

User Avatar

Asked by Wiki User

Layout design serves to organize information, improve readability, create visual hierarchy, and enhance user experience. It helps to guide the viewer's attention, communicate the message effectively, and establish a visual structure that aids in content comprehension. Additionally, layout can also reinforce branding, establish a consistent design language, and optimize space utilization for both print and digital mediums.

How does the binary number system help us in everyday business?

User Avatar

Asked by Waltvictor

1 and 0 stands in for both of these states. Binary numerals are composed of the numbers 1 and 0. Different data are represented by these numbers. The number system is commonly referred to as binary, or base 2 because numbers are represented by two digits.

Do worms take a bath?

User Avatar

Asked by Wiki User

no because they'd die and btw they eat soil

How can viruses and phishing affect the computer?

User Avatar

Asked by Wiki User

Viruses: Viruses can steal your personal information, use your computer as a zombie, and do other nasty things to you.

Phishing: Phishing is a way to steal your personal information by leading you on.

What is the worm in computer?

User Avatar

Asked by Wiki User

Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses andtrojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts. Once installed on a computer, worms spontaneously generate additional email messages contaning copies of the worm. They may also open TCP ports to create networks security holes for other applications, and they may attempt to "flood" the LAN with spurious Denial of Service (DoS) data transmissions.

How do most worms enter a computer system?

User Avatar

Asked by Wiki User

A worm may infect a computer without any action on the users part, or it may trick a user into performing an action which would allow it to infect the computer; though a worm that requires a user to propagate borders on being a Trojan horse, which is another form of malware.
Worms may propagate over a computer network, portable storage, or any other means in which any data could enter a system by exploiting unpatched vulnerabilities in the computer's software.

How are setae used by worms?

User Avatar

Asked by Wiki User

For one example, the setae help the worm resist being pulled from a hole in the groung by a bird.

Why do computers use binary number system instead of the decimal number system?

User Avatar

Asked by Wiki User

Computers use a bunch of on and off switches and don't think of numbers in groups of 10 like humans. They use powers of 2 because each switch can only be made in 2 functions; on or off with only two digits.

When was the computer virus invented?

User Avatar

Asked by Wiki User

the history of coputer viruses started in the 1980's. since of three factors. because of popularity and eager to use.

How do you locate the source of a computer virus?

User Avatar

Asked by Wiki User

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection

What is the terms used when a virus takes control of features on your computer and transports files?

User Avatar

Asked by Wiki User

you check if all ur informatoin that you had on it is still there if not take if to a PC work shop anjd get it fixed

Should you repair if a computer virus is found?

User Avatar

Asked by Wiki User

Yes - the vast majority of computer viruses can be removed, or disabled by most anti-virus software. The trick is - to keep your anti-virus software, and definitions database up-to-date, as people are writing new viruses on a daily basis !

What is computer virus?

User Avatar

Asked by Wiki User

A virus is a piece of code that attaches itself to a program or file so it can spread from computer to computer. They can also try to damage your software, your hardware, and your files. To protect your PC from virus, you'd better enable one antivirus program on your computer.

What is the size of the worm?

User Avatar

Asked by Wiki User

Worm can very in size. They can be microscopic or grow to a littler over three feet in length. The most well known worm is an earthworm.

How do marine worms help the environment?

User Avatar

Asked by Wiki User

they fertilize the plants. its kind of like giving your dog or cat special nutrients food... the worms poop out plant-enriching nutrients.

How are computer virus computer worms and computer Trojan Horse different?

User Avatar

Asked by Wiki User

worm will not effect ur computer

but ,tronjent will currept all the files & disable the task manager...

>Worm viruses will duplicate your folder and end up eating your disk space and your disk memory. On tronjent or Trojan horse will make your executable files corrupt. Both are serious virus since they delete, destroy and duplicate files. In which Anti-viruses can't cope with this problem. The last option is to reformat your computer.

What is the difference between a virus and a worm?

User Avatar

Asked by Wiki User

A virus is a program that is designed to spread from file to file on a single PC, it does not intentionally try to move to another PC, and it must replicate, and execute itself to be defined as a virus.

A worm is designed to copy itself (intentionally move) from PC to PC, via networks, internet etc.

A worm doesnt need a host file to move from system to system, whereas a virus does.

So worms spread more rapidly then viruses.

The word 'Virus' has become a common term a lot of people use to refer to worms and trojans too. Which is not exactly correct.

Do worms live in wet or damp places?

User Avatar

Asked by Wiki User

yes, they prefer damp and dry areas and dont like the really wet areas so when it rains they come to the top of the soil because its to wet for them at the bottom.

Why virus attacks a computer?

User Avatar

Asked by Wiki User

You can get a computer virus in any number of ways. Viruses usually spread to your computer disguised as a useful program that you download and install yourself. Viruses can also spread by exploiting bugs in programs many people use, like Internet Explorer, in order to run code on your computer that will let the viruses install themselves. Viruses can spread this way in both emails and files.

Is a flash card an example of optical storage media?

User Avatar

Asked by Wiki User

I think it is, because its an external memory.