Viruses can only infect Microsoft Windows Systems – False,Among students and office workers, PCs are popular computers, and there may be more people writing software (and viruses) for them than for any other kind of processor. Thus, the PC is most frequently the target when someone writes virus. However, the principles of virus attachment and infection apply equally to other processors, including Macintosh computers, Unix Workstations, and Mainframe computers. In fact, no writeable stored-program computer is immune to possible virus attack. This situation means that all the devices containing computer code, including automobiles, airplanes, microwave oven, radios, televisions, and radiation therapy machines have the potential for being infected by a virus.
Viruses can modify “hidden” or “read-only” files – True,We may try to protect files by using two operating systems mechanisms. First, we can make a file a hidden file so that a user or program listing all files on a storage device will not the file’s name. Second, we can apply a read-only protection to the file so that the user cannot change the file’s contents. However, each of these protections is applied by software, and virus software can override the native software’s protection. Moreover, software protection is layered, with the operating system providing the most elementary protection. If a secure operating system obtains control before a virus contaminator has executed, the operating system can prevent contamination as long as it blocks the attacks the virus will make.
Viruses can only appear in data files, or only in Word Documents, or only in programs – False,What are data? What is an executable file? The distinction between these two conceptions is not always clear, because a data file can control how a program executes and even cause a program to execute. Sometimes a data file lists steps to be taken by the program that read the data, and these steps can include executing a program, For example, some applications contain a configuration file whose data are exactly such steps. Similarly, word processing document files may contain startup commands to execute when the document is opened; these startup commands can contain malicious code. Although, strictly speaking, a virus can activate and spread only when a program executes, in fact, data files are acted upon by programs. Clever virus writers have been able to make data control files that cause programs to do many things, including pass along copies of the virus to other data files.
Viruses spread only on disks or only in email – False,Files sharing is often done as one user provides a copy of a file to another by writing the file on a transportable disk. However, any means of electronic file transfer will work. A file can be placed in a network's library or posed on a bulletin board. It can be attached to an electronic mail message or made available for download from a website. Any mechanism for sharing files - of programs, data, documents, and so forth - can be used to transfer a virus.
Viruses cannot remain in memory after a complete power off/power on reboot - True,If a virus is resident in memory, the virus is list when the memory loses power. That is, computer memory (RAM) is volatile, so that all contents are deleted when power is lost. However, viruses written to disk certainly can remain through a reboot cycle and reappear after the reboot. Thus, you can receive a virus infection, the virus can be written to disk (or to network storage), you can turn the machine off and back on, and the virus can be reactivated during the reboot. Boot sector viruses gain control when a machine reboots (whether it is a hardware of software reboot), so a boot sector virus may remain through a reboot cycle because it activates immediately when a reboot has completed.
Virus can't infect hardware - True,Viruses can infect only things they can modify; memory, executable files, and data are the primary targets. If hardware contains writable storage (so-called firmware) that can be accessed under program control, that storage is subject to virus attack. There have been a few instances of firmware viruses. Because a virus can control hardware that is subject to program control, it may seem as if a hardware device has been infected by a virus, but it is really the software driving the hardware in any way a program can. Thus, for example, a virus could cause a disk to loop incessantly, moving to the innermost track then the outermost and back again to the innermost.