Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Exercise Meeting 5

Name : Rangga Ryantico


Nim : 15220089
Class : 15.2A.05

1. A software which is created to do something bad and to perform criminal intension :


a. Microsoft Software
b. Virus Software
c. Malicious Software
d. Linux Software
e. Pirate Software

2. A software that can replicate by injecting or infecting its own code into other file :
a. Virus
b. File
c. Worm
d. Macro
e. Cookies

3. A software which replicates by creating its own copy :


a. Virus
b. File
c. Worm
d. Macro
e. Cookies

4. Example of Worm :
a. Fall.txt
b. File.txt
c. Worm.txt
d. I Love U.txt
e. Cookies.txt

5. There are kind of malicious software but not infect files :


a. Virus
b. Trojan
c. Tracker
d. Ghost
e. Worm
ESSAY

1. What is the meaning Malicious Software?


Answer :
Which is created to do something bad and to perform criminal intension. This kind of
software is called malicious software or malware.

2. What is the meaning Virus?


Answer :
Virus is a software that can replicate by injecting or infecting its own code into other
file.

3. According to infect to other file, virus can be divided into three categories, mentioned
that and explain?
Answer :
a. Overwriting
A type of computer virus that will copy its own code over the host computer
system file data, which destroys the original program. After your computer
system has been cleaned using an antivirus program, users will need to install
the original program again.
b. Appending
A virus that inserts a copy if its malicious code at the end of the file. The goal
of an appending virus is not to harm the host program, but to modify it to hold
the virus code and then be able to run itself.
c. Prepending
A virus defines the method is uses of infecting files by adding their code to the
beginning of the file. By doing, these viruses ensure that they are activated
when an infected file is used.

4. What is the meaning Trojan Horse and give the examples?


Answer :
Trojan Horse is derived from ancient Greek. Trojan Horse is a program that looks like
a good program but actually contains destructive code or destructive feature. Trojan
horse is different from virus and worm, trojan horse can not replicate and cannot
infect other file.
There are many kind of Trojan Horse. Below are some of them :
a. Password Stealer
b. Keylogger
c. Fake Program
d. Anonymous Emailer
e. Remote Monitoring
f. Remote Administrator
5. How to clean Virus, Malware, Worm, and Trojan Horse! (with your own words)
Answer :
a. Scan malware via safe mode
b. Eliminate malware using windows defender
c. Eliminate malware with antivirus software
d. Eliminate malware by reinstalling the system
e. Clean browser cache
f. Uninstall unknown software
g. Delete temporary files

You might also like