Page 85 - Computing E-Book Grade 6
P. 85
The City School 2021-2022
Worms
Computer Worms are like a virus in the fact that they do self-replicate themselves
within the computer system. However, a computer worm does not have to attach itself
to a program in the system like a computer virus does in order to function. Also, unlike
a computer virus that generally corrupts and modifies files on the computer to cause
damage, a computer worm generally localizes its damage to the computer network by e-Safety and Going Online
causing increased activity from the affected computer.
Spyware
Spyware is a newer type of program that damages the computer system. Spyware
is also not a computer virus in the traditional sense, but it is harmful. Spyware is used
to take some control over the computer user’s interactions with their computer. This is
all done with out the consent of the owner of the computer. Spyware does more than
monitor the computer user’s behavior; it can even collect a lot of personal information.
Spyware can change computer settings, install additional software, redirect web
browser activity, access websites that will permit dangerous viruses to get onto the
computer, and slow connection speeds.
Malware
Malware, short for malicious software, is a
kind of software that can be installed on a
computer without approval from the Checkpoint
computer’s owner. There are different kinds of
Internet protocol refer to the set of rules
malware that can hurt computers, such as followed by the computers when they
connect and transmit data between each
viruses and spyware. These programs can other.
steal passwords, delete files, collect personal Intellectual property refers to creations of
the human mind that are a non-physical
information, or even stop a computer from (or intangible) form of property.
working at all. Computer security or anti-
malware software is usually good at stopping malware from installing itself. When
security software isn’t installed, malware can get into the computer. Getting rid of
malware can be difficult, even when using programs designed to remove it.
85

