Tech Me EngineerTech Me Engineer
  • Engineering
    • Engineering Surveying
    • Construction
    • Construction Materials
  • Designing
    • Engineering Design
    • Graphics Design
  • Social Media
  • Technology
    • Computer
    • Apps
  • Earn Money
  • Tools
    • Brick Calculator
    • Construction Material Calculator
    • Tank Volume Calculator
Reading: What is Computer Virus? 5 Types and Antivirus
Notification Show More
Latest News
approximate construction cost
Calculate a Approximate Construction Cost of the 3 Storey Building[Nepal]
Construction
Origin of Water on Earth
Decoding the Origin of Water on Earth: A Scientific Milestone
Technology
Free Woodworking Diagrams
Are There Websites Offering Free Woodworking Diagrams in AutoCAD Format?
Engineering Design
Innovative Gadgets of 2025
10 Innovative Gadgets of 2025 You Need to Know About
Technology
rebound hammer test
Rebound Hammer Test of Reinforced Cement Concrete: A Comprehensive Guide
Engineering
Aa
Tech Me EngineerTech Me Engineer
Aa
Search
  • Engineering
    • Engineering Surveying
    • Construction
    • Construction Materials
  • Designing
    • Engineering Design
    • Graphics Design
  • Social Media
  • Technology
    • Computer
    • Apps
  • Earn Money
  • Tools
    • Brick Calculator
    • Construction Material Calculator
    • Tank Volume Calculator
Follow US
Tech Me Engineer > Computer > What is Computer Virus? 5 Types and Antivirus
Computer

What is Computer Virus? 5 Types and Antivirus

Ramesh Pradhan
Last updated: 2025/01/21 at 5:30 PM
Ramesh Pradhan
Share
7 Min Read
SHARE

What is Computer Virus?

A computer virus is one of the biggest disasters that may strike a computer system. A computer virus is a program that can copy itself and infect a computer without permission or knowledge of the user. it may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk.

Table of content
What is Computer Virus?The computer virus has the following properties:How does a computer virus SpreadIt can spread through the following media:5 Types of Computer VirusBoot sector virusFile infecting virusMacro virusScript Virus Stealth virusSymptoms of a Computer Virus AttackSome tips for a Safe Computer:Antivirus software

Some viruses can immediately damage while others sit dormant until a certain file is opened or a certain date passes. Damage caused by these can range from little or no effect on your system to complete system failure. some viruses are mildly annoying while others damage data and programs.

The computer virus has the following properties:

The virus can attach itself to another healthy program

This may reproduce itself and then can spread on a computer.

The Virus may harm your computer by damaging programs and deleting files on the computer.

It is difficult to trace a virus after it has spread across a network.

How does a computer virus Spread

Normal Programs are your assistants. Computer Viruses are designed to infect and potentially damage files on a computer that receives them. They are usually activated when the program or file to which it is attached is executed or accessed. A virus can only spread from one computer to another when its host is taken to the uninfected computer.

It can spread through the following media:

By opening an infected e-mail attachment,

By downloading an infected program from the internet,

Shearing music files or photos with other users,

Visiting infected websites,

By using an infected removable disk and an optical disk,

By downloading infected programs from the internet.

5 Types of Computer Virus

Computer viruses and their destructiveness vary widely. Virus behavior can range from annoying to destructive. Computer Viruses can be classified into the following types depending on the target of attack. They are of the following types: boot sector viruses file infecting viruses. Computer viruses also can be classified based on the techniques they use to infect boot sectors or files. They are the following types: macro viruses, polymorphic viruses, stealth viruses, parasitic viruses, and script viruses.

Boot sector virus

The boot sector virus is the type of computer virus that is designed to infect the boot sector of the disk. It either replaces or modified the instruction in the boot sector by some different code. This prevents the hardware from loading system software when the computer is turned on.

A boot sector virus is active when the computer is turned on or restart your computer.

File infecting virus

file infecting virus is a type of computer virus that infects executable program files having an extension .exe, .com, or .dill. This virus either overwrites or modifies the contents of the executable.

Macro virus

A macro virus is a type of computer virus that is encoded as a macro embedded in a document. A macro virus can spread through email attachments, disks, networks, modems, and the internet. for eg.W97M.Melissa & WM.nice day.

Script Virus

Script virus is the one type of computer virus that user interpretive programming languages. The virus instructions are contained in plain text files called script which is ready by “Run time” program interpreters. it can spread through e-mail, floppy disks, and CDs.

Stealth virus

A stealth virus is a type of computer virus that uses special techniques to hide its presence from users and virus scanners. for eg, Frodo, Joshi, and Whale.

Symptoms of a Computer Virus Attack

Some of the symptoms of virus infection are discussed below:

Erases the files or programs from the system,

Decreases the space in the main memory and hard disk,

The appearance of strange massage or strange patterns on the screen,

Slows down the system performance,

Formates the Hard Disk Drive

Application takes longer to start

The antivirus software that you have is not working properly, or it has been disabled,

Unexpected and unknown noises and sounds come out on their own.

Some tips for a Safe Computer:

The following is a list of some recommendations for safe computing:

Always scan files with an anti-virus application before using them,

Update your antivirus program periodically,

Do not load illegal software on your computer. The illegal software contains viruses.

Allow only genuine users to use the computer under supervision.

Never load unknown disks into your system unless you make sure they are virus-free.

Scan all e-mail attachments before executing them on your machine.

Turn on the Firewall of your computer operating system.

Update your operating system regularly.

Antivirus software

Antivirus software is a collection of programs designed to detect computers. Viruses from the system of the device. It must be updated frequently for protection against new viruses. It resides in the memory so that it detects the viruses at the time of entry and prevents them from doing any damage to the system.

Antivirus software typically performs the following tasks:

Scans files and folders for viruses.

It gave information when a virus is detected on the computer or any device.

Cleans virus-infected files.

Continuously monitors memory to protect the computer from memory-resident viruses.

Thanks for reading these articles. I hope this article is very helpful for you. If you like please comment below. Visit again.

What do you think?
Love0
Sad0
Happy0
Angry0
By Ramesh Pradhan
Follow:
Hi, My Name is Ramesh Pradhan. I am qualified as a Civil engineer From Nepal. I am Working in the Reputed Building Construction Company in Nepal. I am also the CEO and Co-Founder of the "Tech Me Engineer" Website. I am Working on the Construction information, AutoCAD, Autodesk, Estimation, Irrigation, Computer, and Related Field on this Website. "THANKS to VISIT"
Previous Article Career in Engineering 8 Best ways to Prepare for a Career in Engineering
Next Article you need to apply patch You Need to Apply Patch When Licence Screen Appears in AutoCAD
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Also Like

Override Software Rendering List
ComputerGraphics Design

What Does Override Software Rendering List Do? Complete Guide

February 11, 2025
Operating Systems Implement Memory Mapping
Computer

How Do Different Operating Systems Implement Memory Mapping Between Processes?

February 6, 2025
how to open the Command Prompt
Computer

How to Open the Command Prompt (Windows 11, 10, 8, 7)

January 21, 2025
best driver updater tools
Computer

Top 8 Best Driver Updater Tools for Free

January 21, 2025

© 2025

Tech me Engineer

All rights reserved

  • About Us
  • Terms And Conditions
  • Privacy Policy
  • Disclaimer
  • Contact Us
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?