Computer Science: Software Piracy

EvaluativeComposite avatar
EvaluativeComposite
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

How do viruses typically spread?

Via removable media

What type of files do direct action viruses typically attach themselves to?

EXE and COM files

What is a characteristic of direct action viruses?

They don't install themselves or remain hidden in a computer's memory

What is the impact of direct action viruses on a user's system?

<p>They make some files inaccessible, but have a minimal impact on the system</p> Signup and view all the answers

What is a characteristic of resident viruses?

<p>They install themselves on a computer</p> Signup and view all the answers

What type of resident viruses cause as much damage as quickly as possible?

<p>Fast infectors</p> Signup and view all the answers

What can resident viruses potentially do to anti-virus software?

<p>Attach themselves to it, infecting every file it scans</p> Signup and view all the answers

What has led to a reduction in the prevalence of viruses?

<p>Improvements in BIOS architecture</p> Signup and view all the answers

What is the primary consequence of software piracy for publishers?

<p>Significant lost revenue</p> Signup and view all the answers

What is the licensed user permitted to do with the software program?

<p>Make copies of the software program for back-up purposes only</p> Signup and view all the answers

What is softlifting?

<p>Borrowing and installing a copy of a software application from a colleague</p> Signup and view all the answers

What is the primary characteristic of a computer virus?

<p>It is a type of malicious software program that replicates itself</p> Signup and view all the answers

What is the consequence of client-server overuse?

<p>Violation of copyright laws</p> Signup and view all the answers

What is hard-disk loading?

<p>Installing and selling unauthorized copies of software on refurbished or new computers</p> Signup and view all the answers

What is online piracy?

<p>Typically involves downloading illegal software from peer-to-peer network, Internet auction or blog</p> Signup and view all the answers

What is counterfeiting?

<p>Duplicating and selling copyrighted programs</p> Signup and view all the answers

What type of computer virus is notoriously difficult to remove and often requires a full system format?

<p>Boot Sector Virus</p> Signup and view all the answers

What is the term commonly used to refer to all forms of malicious software?

<p>Malware</p> Signup and view all the answers

What makes multipartite viruses tough to remove?

<p>They can simultaneously infect both the boot sector and executable files</p> Signup and view all the answers

What is one of the reasons why people create viruses?

<p>To demonstrate a vulnerability in software</p> Signup and view all the answers

What is the estimated annual economic damage caused by computer viruses?

<p>Billions of dollars</p> Signup and view all the answers

What is unique about polymorphic viruses?

<p>They change their signature every time they replicate</p> Signup and view all the answers

What type of malware is a form of malicious software that demands payment in exchange for restoring access to data?

<p>Ransomware</p> Signup and view all the answers

What is the effect of an overwrite virus on a file?

<p>It deletes the contents of the file</p> Signup and view all the answers

Why do antivirus firms need to spend days or months creating detection routines for polymorphic viruses?

<p>Because they change their signature every time they replicate</p> Signup and view all the answers

What is a result of computer viruses infecting a system?

<p>System failure</p> Signup and view all the answers

What is a characteristic of multipartite viruses?

<p>They can spread in multiple ways</p> Signup and view all the answers

What is the term erroneously used to refer to other types of malware?

<p>Virus</p> Signup and view all the answers

What is a response to the threat of computer viruses?

<p>Creating free, open-source antivirus tools</p> Signup and view all the answers

What happens if a multipartite virus remains in the boot sector after cleaning a machine's program files?

<p>The virus will immediately reproduce once the computer is turned on again</p> Signup and view all the answers

What makes polymorphic viruses difficult to detect?

<p>They change their signature every time they replicate</p> Signup and view all the answers

What is a consequence of deleting a file infected by an overwrite virus?

<p>The contents of the file are lost</p> Signup and view all the answers

What happens when you open an infected document?

<p>The macro virus is loaded into main memory and destroys the data stored in the hard disk</p> Signup and view all the answers

How often should you update your anti-virus software?

<p>Weekly</p> Signup and view all the answers

What is a good practice when using floppy drives?

<p>Empty them of diskettes before turning on computers</p> Signup and view all the answers

What should you do when receiving unexpected email attachments?

<p>Delete them without opening them</p> Signup and view all the answers

Why is it important to have multiple backups of important files?

<p>So you can lower the chance that all are infected</p> Signup and view all the answers

Why is it important to install security updates for your operating system and programs?

<p>So you can protect your computer from virus infections</p> Signup and view all the answers

Study Notes

Software Piracy

  • Software piracy is the illegal copying, distribution, or use of software, causing significant lost revenue for publishers and higher prices for consumers.
  • Most software programs are licensed for use by one user or at one computer site, and making copies of the software for anything other than backup purposes is a violation of copyright laws.
  • Types of software piracy include:
    • Softlifting: borrowing and installing a copy of a software application from a colleague
    • Client-server overuse: installing more copies of the software than licensed for
    • Hard-disk loading: installing and selling unauthorized copies of software on refurbished or new computers
    • Counterfeiting: duplicating and selling copyrighted programs
    • Online piracy: downloading illegal software from peer-to-peer networks, Internet auctions, or blogs

Computer Viruses

  • A computer virus is a type of malicious software that replicates itself by modifying other computer programs and inserting its own code.
  • Infected computer programs can include data files, the "boot" sector of the hard drive, and other areas.
  • Computer viruses cause billions of dollars' worth of economic damage each year, due to system failure, wasted computer resources, corrupted data, and increased maintenance costs.
  • Motives for creating viruses can include seeking profit, sending a political message, personal amusement, demonstrating vulnerabilities, sabotage, and denial of service.

Types of Viruses

  • Boot Sector Virus: infects the master boot record, making it difficult to remove, often requiring a full system format.
  • Direct Action Virus: attaches itself to a particular type of file, typically EXE or COM files, and spreads to other similar files in the directory.
  • Resident Virus: installs itself on a computer, allowing it to work even when the original source of the infection has been eradicated.
  • Multipartite Virus: spreads in multiple ways and takes different actions on an infected computer depending on variables like the operating system installed or the existence of certain files.
  • Polymorphic Virus: changes its signature (binary pattern) every time it replicates, making it difficult to detect for anti-virus programs.
  • Overwrite Virus: deletes the contents of any file it infects, requiring the file to be deleted to remove the virus.

Actions to Prevent Virus Infection

  • Always update your anti-virus software at least weekly.
  • Back up your important files and ensure they can be restored.
  • Change the computer's boot sequence to always start the PC from its hard drive.
  • Don't share Drive C: without a password and without read-only restrictions.
  • Empty floppy drives of diskettes before turning on computers, especially laptops.
  • Forget opening unexpected e-mail attachments, even if they're from friends.
  • Get trained on your computer's anti-virus software and use it.
  • Have multiple backups of important files.
  • Install security updates for your operating system and programs as soon as possible.
  • Jump at the chance to learn more about your computer to help spot viruses.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team
Use Quizgecko on...
Browser
Browser