How to prevent computer virus ?

1 Answer

Answer :

Ways to prevent computer viruses: Anti-virus software and other preventive measures: Anti-virus software detects viruses in two common ways. The first and most common method is to identify a virus from a list of virus signatures. The main problem with this detection method is that users are protected only from the viruses mentioned in the aforementioned virus definition updates. The second method is the heuristic algorithm which is detected by the general definition of the virus. This method can detect viruses without being identified by the anti-virus signature firm. Repair process: Once a computer is infected with a virus, it is dangerous to use it without having to reinstall the operating system. However, there are several ways to repair a virus-infected computer. These methods depend on the type of virus and the degree of infection. Virus Removal: The process of undoing a damaged system on Windows XP is known as System Restore , which restores the registry and important system files to their normal state. Many times its application causes the virus to hang on the system and subsequent hard reboot will take it to the previous state of damage. However, some viruses disable the restoration system and other important tools such as task manager and command prompt. One of the viruses that do this is called Sydor. Administrators have the ability to disable these tools for other purposes. The virus does the same thing by modifying the registry , so that when an administrator runs the computer, other users, including himself, are prevented from using these tools. When an infected tool becomes unusable through a virus, it is called " Task Manager has been disabled by your administrator." Gives the message. Reinstalling the operating system: If a computer has a virus that cannot be removed by anti-virus software, reinstalling the operating system may be necessary. To do this, you need to delete the hard drive completely (you need to delete the partition and format it).

Related questions

Description : What harm did CIH virus do to computer ?

Last Answer : CIH virus damages computer hard disk.

Description : Who named the computer virus ?

Last Answer : Fred Cohen named the computer virus.

Last Answer : Computer virus is a kind of malicious program

Description : Want to know which countries in the world have been infected with Corona virus ?

Last Answer : Then you have an answer Browse you ( www.worldometer.com) Number of infected , which countries affected , daily updates , all given according to serial . Thanks

Description : What is a Multipershiet Virus ?

Last Answer : This type of virus (e.g. Tequila) infects multiple objects. Running an exe file infected with the Tequila virus puts itself in the master boot record ( MBR) . When the computer is booted ... exe and MBRs interchangeabley infected Anticad . How many again attack com, exe, MRBs and device drivers.

Description : What is File Virus ?

Last Answer : File virus executable program infects files. This is common but not always. com and exe extends files with extensions. When an infected program is run, the virus first controls the original program that was ... taking full control, the virus copies its code to another file or disk to make a copy.

Description : Who named the virus ?

Last Answer : Fendra Cohen named the virus.

Description : In what year was VIRUS named ?

Last Answer : VIRUS was renamed in 1980.

Description : Where is Brain Virus Made in Pakistan ?

Last Answer : Brain virus is made in Lahore, Pakistan.

Description : Brain virus is made in which country ?

Last Answer : Brain virus is made in Pakistan.

Description : In what year was the brain virus created ?

Last Answer : Brain virus was created in 1986.

Description : What is a virus ?

Last Answer : A virus is a type of malware.

Description : What is a virus ?

Last Answer : A virus is a type of software that attacks information and data and has the ability to increase its own number.

Description : In what year was the virus named ?

Last Answer : The virus was first named in 1980.

Description : How does the virus spread ?

Last Answer : A few years ago, researchers found out about the origin of all these viruses And that is , bats. February 6, 2003 A mysterious epidemic has spread to many countries in Asia The ... insects However, vaccinating these animals can prevent the spread of the virus and protect humans from infection.

Description : Are you aware that researchers are attempting to find away to prevent Virus Replication?

Last Answer : That would be a good thing I think. But nature fights back.

Description : What would your opinion be of a friend who had a killer virus but refused to take proven precautions to prevent them from spreading the disease?

Last Answer : I don't know. Someone I know just found out their boyfriend gave them the herp. Then I found out she's still with him. He claims he didn't know. I'm basically gob-smacked that she's still with him ... that I would turn them into the police. But unless I was in the actual situation, it's hard to say.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : What should be done to prevent the virus from invading the pen drive ?

Last Answer : answer:

Description : Are smartphones also infected with the virus ? What is the way to prevent it ?

Last Answer : Like computers, smartphones can catch viruses. This can lead to data theft , spam, or malicious software. This can cause the smartphone to crash. The good news is that smartphones are easier ... -established apps can be downloaded. Unknown app cannot be downloaded. You can also install Virus Guard.

Description : How to prevent corona virus?

Last Answer : Protecting yourself and others from the unfold COVID-19You could lessen your chances of being infected or spreading COVID-19 with the aid of taking some simple precautions: Regularly and punctiliously easy your ... the COVID-19 virus if the man or woman has the disorder. Keep away from goi

Description : The following are true : a. the HLA proteins are found within the cytoplasm of the cells b. HLA class I antigens are expressed on all cells with nuclei c. HLA class II antigens presents ... on chromosome 6 e. HLA tissue typing is carried out in all forms of transplantation to prevent rejection

Last Answer : HLA class I antigens are expressed on all cells with nuclei

Description : The role of the M cell is to A- .trap virus in mucus and prevent entry B- induce apoptosis in virus-infected small intestinal epithelia cells C- pass bacteria or virus to underlying macrophages for ... and presentation of antigen D- they use their cilia to propel mucus out of the small intestine

Last Answer : pass bacteria or virus to underlying macrophages for processing and presentation of antigen

Description : Back up of the data files will help to prevent - 1) loss of confidentiality 2) duplication of data 3) virus infection 4) loss of data

Last Answer : 4) loss of data

Description : What is the news paper seen on the computer screen called ?

Last Answer : A newspaper seen on a computer screen is called an online magazine.

Description : Why is digital signal useful in computer case ? Explain ?

Last Answer : Binary number system is used in computer design. Digital devices operate in binary mode. There may be a switch off of the digital signal or the signal may be present or absent . These are similar to the binary number system. So digital signal is useful in computer case.

Description : Each computer has a unique address - explain. ?

Last Answer : Every computer on the network has a unique address or identity in the Internet connection system. It has Protocol version 4 (IP V4) and Internet Protocol version 6 (IP V6) . For example: http://www.google.com.

Description : What is the most commonly used program for writing letters on a computer ?

Last Answer : Word processing programs are commonly used to write letters on a computer .

Description : Which is the first complete digital computer ?

Last Answer : The first complete digital computer is Mark- 1.

Description : How to install software on computer ?

Last Answer : Open the required file. Now from the file. Double click on exe file or setup file. To accept the terms , tick Accept or I agree . Now keep on giving next . If you want code, you will find a file named serial inside the file, open it. Copy and paste it. Give the setup Finish .

Description : What is the name of the first computer made by IBM company ?

Last Answer : Mainframe is the name of the first computer made by IBM company.

Description : Which is the first computer made with IC ?

Last Answer : The first computer made with IC IBM360.

Description : By what law is the improvement of computer hardware theory summarized ?

Last Answer : Improvements in computer hardware theory are summarized by Moore's First Law .

Description : What is the flashing symbol on the computer screen called ?

Last Answer : The flashing symbol on a computer screen is called a cursor.

Description : In which memory data is temporarily stored while working on computer ?

Last Answer : Data is temporarily stored in RAM (Random Access Memory) while working on the computer .

Description : What are the most commonly used instructions for a computer program ?

Last Answer : The most commonly used instructions of a computer program can be obtained from cache memory.

Description : What is the process of transferring files from Internet to computer called ?

Last Answer : The process of transferring files from Internet to computer is called downloading.

Description : What are all the mathematical and logical functions performed on a computer ?

Last Answer : All mathematical and logical functions in computer are performed by Central Processing Unit .

Description : Which electronic component was used in the first generation of computer ?

Last Answer : Electronic component vacuum tubes were used in the first generation of computers.

Description : Which computer will have artificial intelligence ?

Last Answer : 5th generation computers will have artificial intelligence.

Description : Which computer engineer won the Nobel Prize in Literature in 2003 ?

Last Answer : Computer Engineer J.M. Quetzi received the Nobel Prize in Literature in 2003 .

Description : Who is known as Human-Computer of India ?

Last Answer : Shakuntala Devi, known as the Human-Computer of India.

Description : What is computer monitoring ?

Last Answer : Another explosive ethical issue of information technology that scares everyone is computer monitoring of quality of work. This means that millions of employees use computers to monitor their productivity ... who have to work under electronic surveillance at the same time often face health problems.

Description : What is the purpose of computer networking ?

Last Answer : A computer network system is created by connecting multiple computers one after the other. A computer network system is a system where everyone on the network can share and work together with ... , software research shares and information research shares increase the accuracy and speed of the work.

Description : What is a computer security plan ?

Last Answer : A computer security plan is a plan that summarizes all the safeguards in writing to protect company information. The International Computer Security Association ( ICSA) collaborates with computer security plans.

Description : Why is binary number system used in computer design ?

Last Answer : Considering 0 as OFF and 1 as ON in digital signal , digital devices are easily understood, so binary number system is used in computers. Electronic circuit design is very simple as the binary system is in two states For all these reasons, binary methods are used in computer design.

Description : How does a computer process data ?

Last Answer : : The computer processes the data through the CPU by bringing the data received through input into memory. The internal process of data processing in a computer is quite complex. The following tasks are ... incredibly fast, we see so many cycles or steps being solved in the blink of an eye.

Description : What is Palmtop Computer or Personal Digital Assistant or PDA ?

Last Answer : Palm ( Palm) means the computer that can be worked in the palm of the hand is called a palmtop computer. It is also called Personal Digital Assistant or PDA or Handheld or Pocket Computer. This model is ... It also allows users to write. Due to its small size, it usually does not have a disk drive.

Description : Write using a hybrid computer ?

Last Answer : Use of Hybrid Computer: Various complex and difficult scientific and technical problems can be solved very easily and quickly through this computer. It is used in laboratories to determine the ... digital part. The digital part reveals the patient's condition based on the information obtained.

Description : What are the features of a hybrid computer ?

Last Answer : Hybrid computer features 1. Made in a combination of analog and digital technology. 2. The input is of analog nature and the output is digital. 3. Used for special purposes. 4. The structure is complex in nature. 5. The price is relatively high.