computer virus
Our editors will review what you’ve submitted and determine whether to revise the article.
- University of Maryland - Department of Computer Science - A History Of Computer Viruses -The Famous ‘Trio’
- AllMovie - Ronald Colman
- Academia - Computer Viruses
- Workforce LibreTexts - Computer Viruses
- University of Wollongong Australia - Computer Viruses: an Introduction
- University of Wollongon Australia - Computer Viruses: an Introduction
- Khan Academy - Intro to viruses
- Related Topics:
- cybercrime
- malware
- computer program
- antivirus software
- On the Web:
- University of Maryland - Department of Computer Science - A History Of Computer Viruses -The Famous ‘Trio’ (Apr. 08, 2024)
computer virus, a portion of a computer program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy data and program code or, in the case of ransomware, to extort payment.
A virus consists of a set of instructions that attaches itself to other computer programs, usually in the computer’s operating system, and becomes part of them. In most cases, the corrupted programs continue to perform their intended functions but surreptitiously execute the virus’s instructions as well. A virus is usually designed to execute when it is loaded into a computer’s memory. Upon execution, the virus instructs its host program to copy the viral code into, or “infect,” any number of other programs and files stored in the computer. The infection can then transfer itself to files and code on other computers through memory-storage devices, computer networks, or online systems. The replicating viruses can multiply until they destroy data or render other program codes meaningless. A virus may simply cause a harmless joke or cryptic message to appear on a computer user’s monitor when the computer is turned on. A more damaging virus can wreak havoc on an extremely large computer system within a matter of minutes or hours, causing it to crash and thereby destroy valuable data, or can disable a computer system until a ransom is paid.