Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

What will be an ideal response?


Student responses will vary, but should be drawn from the following information from the text.

Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices. Some malware contains characteristics in two or more classes. For example, a single threat could contain elements of a virus, worm, and Trojan horse. Some websites maintain lists of known malware.

Malware can deliver its payload, or destructive event or prank, on a computer or mobile device in a variety of ways, such as when a user opens an infected file, runs an infected program, connects an unprotected computer or mobile device to a network, or when a certain condition or event occurs, such as the computer's clock changing to a specific date. A common way that computers and mobile devices become infected with viruses and other malware is through users opening infected email attachments.

Common types of malware include:
Virus: A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
Worm: A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.
Trojan horse: A program that hides within or looks like a legitimate program. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers or devices.
Rootkit: A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
Spyware: A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware: A program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.

Computer Science & Information Technology

You might also like to view...

A directs a user to take a specific action.

a) declaration b) error c) prompt d) None of the above.

Computer Science & Information Technology

Create a World object and a Turtle object and use the Turtle object to draw an arrow.

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking Questions Case 10-1You are planning to open a new restaurant and need to determine how many dinners need to be sold to stay above the break-even point. You will investigate Cost Volume Profit (CVP), also known as break-even analysis. Another tool to help analyze several what-if analyses is data tables in Excel. Using a one-variable table, you can specify _______ input cell(s) and any number of result cells.

A. many B. one C. two D. three

Computer Science & Information Technology

When using spreadsheet software like the kind in the accompanying figure, what are the rows and columns collectively called?

A. workbook B. workspace C. workload D. worksheet

Computer Science & Information Technology