{"id":25505374,"date":"2022-01-24T10:00:15","date_gmt":"2022-01-24T04:30:15","guid":{"rendered":"https:\/\/entri.app\/blog\/?p=25505374"},"modified":"2022-01-23T20:53:01","modified_gmt":"2022-01-23T15:23:01","slug":"computer-virus-introduction-types-notes-pdf","status":"publish","type":"post","link":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/","title":{"rendered":"Computer Virus &#8211; Introduction, Types Notes PDF"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e954de5fb73\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e954de5fb73\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#What_is_a_Computer_Virus\" >What is a Computer Virus?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#Types_of_Computer_Virus\" >Types of Computer Virus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#How_To_Protect_Your_Computer_from_Virus\" >How To Protect Your Computer from Virus?<\/a><\/li><\/ul><\/nav><\/div>\n<p>A computer virus is a malicious computer program that can destroy your computer within seconds. There are different types of viruses are available that can destroy the smart and perfect working of a\u00a0 computer. The malicious program can replicate itself once it is installed on the computer. The code is highly malicious as it is capable of destroying the files by infecting them quickly. The symptoms of a dark spot on the display screen signal the presence of viruses in the computer. It can destroy the pro9grams and affects the functioning of the computer. Computer viruses can affect our computers differently. The types of computer viruses and the effects of computer viruses are addressed here. The readers can also come across the best strategy to answer the question of how to prevent computer viruses.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/entri.app\/blog\/computer-network-mcq-question-and-answer-pdf\/\" target=\"_blank\" rel=\"noopener\"><strong>Know more about the computer network mcq question and answer pdf here!<\/strong><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_Computer_Virus\"><\/span><strong>What is a Computer Virus?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A computer virus is a program that can be easily inserted into the system with the aim of the destruction of certain programs. Computer viruses are highly capable as they can damage our devices and files. Computer viruses can contaminate the files without giving a chance for the proper retrieval of the necessary information. The virus is highly capable of replication and reduplication and it can modify itself. The computer virus can modify the other computer programs available in the system and penetrate its coding. The code once inserted can spread fast and massive destruction of the data and files happens within a fragment of seconds. The whole device may ultimately crash.<\/p>\n<p>Computer viruses are a matter of concern for users across the world. computer viruses can use damage billions annually. It is a matter of great concern. Computer viruses affect programming. It is impossible to be visible with naked eyes. But some symptoms can help the users to identify the preference of viruses. The symptoms confirming the presence of the virus in your computer include.<\/p>\n<ul>\n<li>If a virus is present in your system, it takes time to open up many of the applications. The computer works slowly in such cases. The speed of the system decreases<\/li>\n<li>Too many pops up windows on the display screen indicates the presence of the virus\u00a0 affection<\/li>\n<li>The self-execution of the programs may happen. Many of the programs may start function in the background of the system and you will be unaware about its working.<\/li>\n<li>The accounts will be hacked and the sites which are protected with the password can be cracked and you will be logged out by itself.<\/li>\n<li>The entire system stop working smoothly. The system may crack down all of a sudden.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><a href=\"https:\/\/entri.app\/blog\/computer-network-mcq-question-and-answer-pdf\/\" target=\"_blank\" rel=\"noopener\"><strong>Know more about computer networks here!<\/strong><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_Computer_Virus\"><\/span><strong>Types of Computer Virus<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Refer to the below list to know about the list of the different types of viruses.<\/p>\n<h3><strong>Boot Sector Virus<\/strong><\/h3>\n<p>One of the dangerous viruses which can contaminate the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The Boot sector incorporates the entire files. The Boot sector is important as it contains the files which are mandated to initiate the Operating system of the computer. The virus can overwrite the existing program and copy itself into the other part of the disk.<\/p>\n<h3><strong>Direct Action Virus <\/strong><\/h3>\n<p>This type of virus links itself directly to a .exe or .com file and destroys the device. It enters into the file and starts its execution which is in other words called the Direct Action Virus. Once inserted and installed, it remains hidden and can be considered a non-resident virus.<\/p>\n<h3><strong>Resident Virus<\/strong><\/h3>\n<p>A virus that preserves itself in the memory of the computer. It is capable of infecting other files and the originating program stops working. The virus is hard to remove from the system as it is unable to locate. It hides very well in the memory of the system and destroys it completely.<\/p>\n<h3><strong>Multipartite Virus<\/strong><\/h3>\n<p>A virus that can bombard the boot sector and the executable files of an already contaminated computer together is called a multipartite virus. This virus can facilitate cyber crimes as the system can be completely hacked by the insertion of the virus.<\/p>\n<h3><strong>Overwrite Virus <\/strong><\/h3>\n<p>These are the most harmful viruses. It can remove the current program and substitute it with the adversary code by overwriting it. The host code can be entirely replaced with the harmful code.<\/p>\n<h3><strong>Polymorphic Virus <\/strong><\/h3>\n<p>This type of virus is disseminated through spam and infected websites. the viruses are too complex and are difficult to notice. The presence cannot be detected easily. They construct a modified or morphed version of the current program. It can destroy the running code and replace it with the harmful code of the virus.<\/p>\n<h3><strong>File Infector Virus <\/strong><\/h3>\n<p>This virus first infects a single file and then subsequently unfurls itself to further executable files and programs. The virus can be infected through downloaded games and word processors.<\/p>\n<h3><strong>Space filler\u00a0Virus <\/strong><\/h3>\n<p>This is considered a rare type of virus. the specialty of ten viruses is that it is capable of filling the space in a program or a file with the available source of viruses. This is thus named cavity virus. It affects the size of the file and is unidentifiable.<\/p>\n<h3><strong>Macro Virus <\/strong><\/h3>\n<p>A virus registered in the identical macro language as employed in the software program is known as the macro virus. it infects directly when a word file is opened in the computer at the time of the execution of the virus. The emails can be notorious for carrying these viruses across.<\/p>\n<p>Computer Virus &#8211; Introduction, Types Notes PDF Download<\/p>\n<p>The learners can download the pdf format of Computer Virus &#8211; Introduction, Types Notes from the link given below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/A-computer-virus.edited.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Click here to download the Computer Virus &#8211; Introduction, Types Notes PDF !<\/strong><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_To_Protect_Your_Computer_from_Virus\"><\/span><strong>How To Protect Your Computer from Virus?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Your computer can be protected from the virus if you are willing to take the safety measures which include the downloading, and installation of the anti-virus software. the antivirus software can help the computer to detect hidden malicious viruses and save your computer from destruction. An antivirus software consist of a set of programs that can catch and terminate all the harmful and malicious software from your device. The commonly used anti-virus software are given below.<\/p>\n<ul>\n<li><strong>Kaspersky Antivirus<\/strong><\/li>\n<li><strong>AVAST Antivirus<\/strong><\/li>\n<li><strong>Comodo Antivirus<\/strong><\/li>\n<li><strong>Norton Antivirus<\/strong><\/li>\n<li><strong>F-Secure Antivirus<\/strong><\/li>\n<li><strong>McAfee Antivirus<\/strong><\/li>\n<\/ul>\n<p>Computer viruses are of different types. Entri APP can provide the best materials for all your upcoming competitive exams. Make learning a better experience!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A computer virus is a malicious computer program that can destroy your computer within seconds. There are different types of viruses are available that can destroy the smart and perfect working of a\u00a0 computer. The malicious program can replicate itself once it is installed on the computer. The code is highly malicious as it is [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":25505384,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[802,558],"tags":[],"class_list":["post-25505374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-general-knowledge"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Virus - Introduction, Types Notes PDF - Entri Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Virus - Introduction, Types Notes PDF - Entri Blog\" \/>\n<meta property=\"og:description\" content=\"A computer virus is a malicious computer program that can destroy your computer within seconds. There are different types of viruses are available that can destroy the smart and perfect working of a\u00a0 computer. The malicious program can replicate itself once it is installed on the computer. The code is highly malicious as it is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\" \/>\n<meta property=\"og:site_name\" content=\"Entri Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/entri.me\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-24T04:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"615\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anjely Aravindan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@entri_app\" \/>\n<meta name=\"twitter:site\" content=\"@entri_app\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anjely Aravindan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\"},\"author\":{\"name\":\"Anjely Aravindan\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/person\/ba91dceda75e8fac396bb0731cebe2f3\"},\"headline\":\"Computer Virus &#8211; Introduction, Types Notes PDF\",\"datePublished\":\"2022-01-24T04:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\"},\"wordCount\":1090,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/entri.app\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png\",\"articleSection\":[\"Articles\",\"General Knowledge\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\",\"url\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\",\"name\":\"Computer Virus - Introduction, Types Notes PDF - Entri Blog\",\"isPartOf\":{\"@id\":\"https:\/\/entri.app\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png\",\"datePublished\":\"2022-01-24T04:30:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage\",\"url\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png\",\"contentUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png\",\"width\":820,\"height\":615,\"caption\":\"Computer Virus - Introduction, Types Notes PDF\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/entri.app\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General Knowledge\",\"item\":\"https:\/\/entri.app\/blog\/category\/general-knowledge\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer Virus &#8211; Introduction, Types Notes PDF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/entri.app\/blog\/#website\",\"url\":\"https:\/\/entri.app\/blog\/\",\"name\":\"Entri Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/entri.app\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/entri.app\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/entri.app\/blog\/#organization\",\"name\":\"Entri App\",\"url\":\"https:\/\/entri.app\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png\",\"contentUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png\",\"width\":989,\"height\":446,\"caption\":\"Entri App\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/entri.me\/\",\"https:\/\/x.com\/entri_app\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/person\/ba91dceda75e8fac396bb0731cebe2f3\",\"name\":\"Anjely Aravindan\",\"description\":\"Anjely Aravindan is an experienced lecturer in English Language and Literature, who passionately worships the Muse of Writing. She has UGC NET in English along with her Master's in English language and literature. She uses her teaching and writing skills dynamically in educational spaces, whereby the learner is assisted in the process of personal growth, academic development, and social mobility. She has been writing blogs for Entri over the past five years, specialising in Spoken English, creative, academics, skilling and career development blogs. She is an experienced writer with several National and International research paper presentation and publications in her accord. She is a poet who has published four poems in journals. A predilection towards words keeps up her spirit of writing blogs of different genres.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/anjely-aravindan-6a1a30222\/?originalSubdomain=in\"],\"url\":\"https:\/\/entri.app\/blog\/author\/anjelyaravindan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Virus - Introduction, Types Notes PDF - Entri Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/","og_locale":"en_US","og_type":"article","og_title":"Computer Virus - Introduction, Types Notes PDF - Entri Blog","og_description":"A computer virus is a malicious computer program that can destroy your computer within seconds. There are different types of viruses are available that can destroy the smart and perfect working of a\u00a0 computer. The malicious program can replicate itself once it is installed on the computer. The code is highly malicious as it is [&hellip;]","og_url":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/","og_site_name":"Entri Blog","article_publisher":"https:\/\/www.facebook.com\/entri.me\/","article_published_time":"2022-01-24T04:30:15+00:00","og_image":[{"width":820,"height":615,"url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png","type":"image\/png"}],"author":"Anjely Aravindan","twitter_card":"summary_large_image","twitter_creator":"@entri_app","twitter_site":"@entri_app","twitter_misc":{"Written by":"Anjely Aravindan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#article","isPartOf":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/"},"author":{"name":"Anjely Aravindan","@id":"https:\/\/entri.app\/blog\/#\/schema\/person\/ba91dceda75e8fac396bb0731cebe2f3"},"headline":"Computer Virus &#8211; Introduction, Types Notes PDF","datePublished":"2022-01-24T04:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/"},"wordCount":1090,"commentCount":0,"publisher":{"@id":"https:\/\/entri.app\/blog\/#organization"},"image":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage"},"thumbnailUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png","articleSection":["Articles","General Knowledge"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/","url":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/","name":"Computer Virus - Introduction, Types Notes PDF - Entri Blog","isPartOf":{"@id":"https:\/\/entri.app\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage"},"image":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage"},"thumbnailUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png","datePublished":"2022-01-24T04:30:15+00:00","breadcrumb":{"@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#primaryimage","url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png","contentUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/01\/Untitled-60-1.png","width":820,"height":615,"caption":"Computer Virus - Introduction, Types Notes PDF"},{"@type":"BreadcrumbList","@id":"https:\/\/entri.app\/blog\/computer-virus-introduction-types-notes-pdf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/entri.app\/blog\/"},{"@type":"ListItem","position":2,"name":"General Knowledge","item":"https:\/\/entri.app\/blog\/category\/general-knowledge\/"},{"@type":"ListItem","position":3,"name":"Computer Virus &#8211; Introduction, Types Notes PDF"}]},{"@type":"WebSite","@id":"https:\/\/entri.app\/blog\/#website","url":"https:\/\/entri.app\/blog\/","name":"Entri Blog","description":"","publisher":{"@id":"https:\/\/entri.app\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/entri.app\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/entri.app\/blog\/#organization","name":"Entri App","url":"https:\/\/entri.app\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png","contentUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png","width":989,"height":446,"caption":"Entri App"},"image":{"@id":"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/entri.me\/","https:\/\/x.com\/entri_app"]},{"@type":"Person","@id":"https:\/\/entri.app\/blog\/#\/schema\/person\/ba91dceda75e8fac396bb0731cebe2f3","name":"Anjely Aravindan","description":"Anjely Aravindan is an experienced lecturer in English Language and Literature, who passionately worships the Muse of Writing. She has UGC NET in English along with her Master's in English language and literature. She uses her teaching and writing skills dynamically in educational spaces, whereby the learner is assisted in the process of personal growth, academic development, and social mobility. She has been writing blogs for Entri over the past five years, specialising in Spoken English, creative, academics, skilling and career development blogs. She is an experienced writer with several National and International research paper presentation and publications in her accord. She is a poet who has published four poems in journals. A predilection towards words keeps up her spirit of writing blogs of different genres.","sameAs":["https:\/\/www.linkedin.com\/in\/anjely-aravindan-6a1a30222\/?originalSubdomain=in"],"url":"https:\/\/entri.app\/blog\/author\/anjelyaravindan\/"}]}},"_links":{"self":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25505374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/comments?post=25505374"}],"version-history":[{"count":3,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25505374\/revisions"}],"predecessor-version":[{"id":25505385,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25505374\/revisions\/25505385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/media\/25505384"}],"wp:attachment":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/media?parent=25505374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/categories?post=25505374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/tags?post=25505374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}