Back to Course

JSS3: COMPUTER STUDIES - 1ST TERM

0% Complete
0/0 Steps
  1. Computer Career Oppurtunities | Week 1
    5Topics
    |
    1 Quiz
  2. Computer Viruses I | Week 2
    7Topics
    |
    1 Quiz
  3. Computer Viruses II | Week 3
    7Topics
    |
    1 Quiz
  4. Introduction To The Internet | Week 4
    4Topics
    |
    1 Quiz
  5. Internet Terminologies | Week 5
    4Topics
    |
    1 Quiz
  6. The Concept of Digital Divide | Week 6
    5Topics
    |
    1 Quiz
  7. Database Concept, Definition And Terminologies | Week 7
    4Topics
    |
    1 Quiz
  8. Database II | Week 8
    4Topics
    |
    1 Quiz
  9. Database III | Week 9
    13Topics
    |
    1 Quiz
Lesson Progress
0% Complete

A computer worm is a standalone malicious computer program, that replicates itself in order to spread to other computers. Oftentimes, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms can cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Worms spread by exploiting weaknesses in operating systems. When security updates are installed on a PC, then the majority of the worms are unable to spread to it.

Users need to be wary of opening an unexpected email, and should not run attached files or programs or visit websites that are linked to such emails. Anti-virus and anti-spyware software are helpful but must be kept up-to-date, with new pattern files at least every 5days. The use of a firewall is also recommended.

Examples of computer worms are

  • blaster (love san)
  • bagle.
  • brontok.
  • I love you (love bug)
  • Melissa (virus)

back-to-top
error: