• Assignments Points Earned
  • Extra Credit
  • TOTAL 60 Test Review Games
  • Technology Operations and Concepts Unit 6 Examview Test
  • Virus Types/Classification Description
  • Communication Networks and the Internet Digital L




    Download 108.82 Kb.
    bet1/5
    Sana19.03.2017
    Hajmi108.82 Kb.
    #364
      1   2   3   4   5

    Computer Technology

    Communication Networks and the Internet Digital Literacy


    Unit 6 Grade Sheet



    Viruses & Destructive Programs

    (S3 Obj 1)



    Completed

    Assignments

    Points

    Earned



    Unit 6— Study Guide & Assignment

    40






    Unit 6 -- Extra Credit Wordle.net Activity

    Saved as: lastname firstname Unit 6 Wordle

    Submit to Dropbox


    (20)






    Unit 6—Bingo Review

    20







    TOTAL

    60





    Test Review Games:

    QuzletTest Review Game: http://quizlet.com/13194142/unit-6-viruses-destructive-programs-test-review-flash-cards/


    Technology Operations and Concepts

    Unit 6 Examview Test:

    Date: _____________________________________



    Name: ____________________________________________________________ Period: _____
    VIRUSES AND DESTRUCTIVE PROGRAMS

    Unit 6 Terminology Study Guide & Assignment

    Computer Tech

    S3 Obj 1

    Viruses
    1. What is a virus?

    A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user.


    2. Viruses can either be considered a __nuisance__ or ___destructive.__________
    3. A virus can:

    a) Corrupt files______________________________________________


    b) Destroy data______________________________________________

    c) Display irritating messages____________________________________________


    e) Corrupt computer systems ______________________________________________

    4. Virus Classifications




    Virus Types/Classification

    Description

    1. Trojan Horse


    Has the appearance of having a useful and desired function. Secretly the program preforms undesired functions. Does not replicate itself.

    2.Worms


    A program that makes copies of itself through disk to disk or through email.

    3. Bootsector Virus


    Attaches itself to the first part of the hard disk that is read by the computer during the boot up process.

    4. Macro Virus


    Uses another application’s macro programming language to distribute themselves. The infect documents such as MS Word, Excel, etc.

    5. Memory Resident Viruses


    Viruses that reside in a computers RAM. They stay in memory after its initiating program closes.

    6. Rootkit Virus


    An undetectable virus which attempts to allow someone to gain control of a computer system. Disguised as operating system files.

    7.Polymorphic Viruses


    Copies itself by creating multiple files of itself. It changes its signature making it had for antivirus software to detect.

    8. Logic Bombs/Time Bombs


    Programmed to initiate at a specific date or when a specific event occurs.





    Download 108.82 Kb.
      1   2   3   4   5




    Download 108.82 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Communication Networks and the Internet Digital L

    Download 108.82 Kb.