• Assignments Points Earned
  • Extra Credit
  • TOTAL 60 Test Review Games
  • Technology Operations and Concepts Unit 6 Examview Test
  • Virus Types/Classification Description
  • Communication Networks and the Internet Digital L

    Download 108,82 Kb.
    Hajmi108,82 Kb.
      1   2   3   4   5

    Computer Technology

    Communication Networks and the Internet Digital Literacy

    Unit 6 Grade Sheet

    Viruses & Destructive Programs

    (S3 Obj 1)





    Unit 6— Study Guide & Assignment


    Unit 6 -- Extra Credit Wordle.net Activity

    Saved as: lastname firstname Unit 6 Wordle

    Submit to Dropbox


    Unit 6—Bingo Review




    Test Review Games:

    QuzletTest Review Game: http://quizlet.com/13194142/unit-6-viruses-destructive-programs-test-review-flash-cards/

    Technology Operations and Concepts

    Unit 6 Examview Test:

    Date: _____________________________________

    Name: ____________________________________________________________ Period: _____

    Unit 6 Terminology Study Guide & Assignment

    Computer Tech

    S3 Obj 1

    1. What is a virus?

    A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user.

    2. Viruses can either be considered a __nuisance__ or ___destructive.__________
    3. A virus can:

    a) Corrupt files______________________________________________

    b) Destroy data______________________________________________

    c) Display irritating messages____________________________________________

    e) Corrupt computer systems ______________________________________________

    4. Virus Classifications

    Virus Types/Classification


    1. Trojan Horse

    Has the appearance of having a useful and desired function. Secretly the program preforms undesired functions. Does not replicate itself.


    A program that makes copies of itself through disk to disk or through email.

    3. Bootsector Virus

    Attaches itself to the first part of the hard disk that is read by the computer during the boot up process.

    4. Macro Virus

    Uses another application’s macro programming language to distribute themselves. The infect documents such as MS Word, Excel, etc.

    5. Memory Resident Viruses

    Viruses that reside in a computers RAM. They stay in memory after its initiating program closes.

    6. Rootkit Virus

    An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.

    7.Polymorphic Viruses

    Copies itself by creating multiple files of itself. It changes its signature making it had for antivirus software to detect.

    8. Logic Bombs/Time Bombs

    Programmed to initiate at a specific date or when a specific event occurs.

    Download 108,82 Kb.
      1   2   3   4   5

    Download 108,82 Kb.

    Bosh sahifa

        Bosh sahifa

    Communication Networks and the Internet Digital L

    Download 108,82 Kb.