Functions and Viruses
On this page, you will find the functions
of a computer, various types of viruses that you could encounter when working with a
computer, and a vocabulary of different computer terms you may or may not be familiar
Functions- A computer is a machine that
electronically operates and performs tasks.
A computer can perform mathematical
calculations, communicate in a variety of ways, and respond to your actions based upon
it's programming. All computer functions are activated and controlled by running programs.
Computers of today are able to do such operations as create, edit, and convert graphics.
They are able to run games, run word processing programs, and give you access to reference
material in various programs.
Viruses and Infections
Virus- a virus is (in computer terms) a
self copying program that interferes with normal processes. Much like a human virus, they
are designed to avoid detection and you may never know you are infected until it is too
late. Like actual viruses, they adapt to a computer's hard disk and spread without you
knowing until it's program affects your normal processes.
Computer viral infections occur like
other, normal viruses. They spread by contact. Anytime a virus is exchanged over floppy
disks or other transference's, it spreads to just about anywhere possible. It will
duplicate itself and start infecting the computer as soon as the file it is attached to is
open and run. It goes to legitimate programs, to a hard disk, across a network, to a
floppy disk, or wherever the program comes into contact with. Infections are more probable
among PC's (especially networked PC's) than mainframes due to the fact that programs on
PC's are exchanged more frequently and on unregulated networks.
Types of Viruses
There are many types of viruses so we're
just going to mention a few of the most common types of viruses.
Trojan Horse- A Trojan horse virus is a
very damaging virus. It seems to be a useful program when you first get it, but when you
activate the program it does something damaging to your hard disk without you knowing
about it. Usually, it will destroy files or other non-tangible objects (software).
Network Worm- The network worm isn't so
much a virus itself as a way of planting a virus. It acts as a username or password that
is also a command and spreads to all computers using that access code. After the network
worm gets into the computer, it proceeds to plant a virus (such as a Trojan horse) into
the computer. Network Worms spread very quickly and can, therefore, cause a lot damage in
a short period of time.
Logic Bomb- A logic bomb is more annoying
than damaging (in most cases). They are also known as time bombs. They are pieces of code
that are implanted into a program and are activated once a certain event takes place.
Examples of such events would be certain words or phrases that would be typed and, thus,
would activate the virus. After the event takes place, an annoying message would pop up on
your screen or something might come up on your screen like a bunch of lines or a
There are many terms used thus far and
throughout this site, and it would help for you to know what we are talking about. If you
consider yourself a beginner in computers (even though you are on the Internet, quick and
easy start-up engines allow you to do this with very little computer knowledge) you might
want to take a look at this section of our site.
PC- PC is an abbreviated form of the word
personal computer. We use it quite a bit in our website.
Hyperlink- Hyperlinks are links to other
sites. They connect web pages together. They are usually text-based and will probably be a
different color than your normal text. Image hyperlinks are sometimes outlined in that
afore mentioned different color. On every hyperlink, when your cursor scrolls over it,
your cursor will probably change to a hand pointing with it's fore finger or something of
Run- To open a file (execute) that will cause the computer to read it's coding
and, thus, the application will begin.
Program/Application- A file that can be
accessed and run. Some examples would be the Internet browser you have opened now, a word
processor application, or a game.
RAM- Random Access Memory, sometimes
known as Restricted Access Memory, is memory on your computer that is not saved to (thus
restricted), but is used to allow your computer to operate. It is random in that you can
access any part of that memory at anytime based upon your need.
Peripherals- Peripherals are
"extras" such as printers, scanners, external speakers, or external modems. They
enhance the computer's ability to perform tasks you want it to perform.