You are on page 1of 1

Activity No.

1. List down and explain the most common computer


viruses.
Resident Virus - Resident viruses infiltrate your RAM and disrupt your
system's operations. They're so cunning that they can even attach
themselves to the files of your anti-virus software.
Multipartive Virus - Multipartite viruses spread by performing unauthorized
actions on your operating system, folders, and programs, infecting the entire
system.
Direct Action - By replicating and infecting files, this virus targets a specific
file type, most commonly executable files (.exe). This virus is one of the
easiest to detect and remove due to its targeted nature.
Browser Hijacker - This virus infects your browser and redirects you to
malicious websites. It is easily detected
Overwrite Virus - Overwrite viruses, as the name implies, infect entire
folders, files, and programs by overwriting file content.
Web Scripting Virus - This nefarious virus hides in the coding of links,
advertisements, images, videos, and website code. When users download
malicious files or visit malicious websites, it can infect their computers.
File Infector - When a user runs executable files (.exe), file infector viruses
slow down the program and damage system files.
Network Virus – Viruses that travel over networks and replicate using shared
resources are known as network viruses.
Boot Sector Virus - This virus hides in a file on a USB drive or an email
attachment, making it one of the easier viruses to avoid. When activated, it
can damage the system by infecting the master boot record.

2 .How the tips safe online is important and helpful today?


- It's important and useful because it protects our devices better, and
it also prevents viruses from getting or entering our devices, which is
great because you have control over the devices you own. When
viruses get into your devices, they can either destroy them or take
control of them, which is something we should avoid because who
knows what else might happen to the apps on your devices, especially
where your personal information is stored.

• SOURCE:
*https://l.facebook.com/l.php?u=https%3A%2F%2Fhightouchtechnologies.com%2F9
-common-types-of-computer-
viruses%2F%3Ffbclid%3DIwAR1fnOZrNDN_PFZeBoS8tWVxZx3QT8kcXvECMs
3C92yp3E0Lb73CxGE7kus&h=AT3ZHQHLfyvXwTMgZ4cLTfSVH-
QbfP6JYUHsWeVceFsDuFFEf0QncfH3ULeDoxST_Au6LJNBSlvVEiUelpQNLC7g
Tsz1lULyM2ulnBqoSohRsspzRk34UM1UhISPR-3vN4KRPA

You might also like