Certainly there is probably a way to accomplish anything on a network of computers, but I think "depositing" a file on to a computer is NOT the same as making it the target of a computer virus.
The teacher has presented you with a "research challenge" and the ultimate goal of this may be to force you into doing a little homework!
Virii usually require the passive acceptance of a person by being "granted" access to a computer by means of the authorized user downloading them, as an e-mail attachment, or introducing them to the computer by means of physical media (CD-R/W, Flash Drive, Thumb Drive or Portable USB hard drive). We still call this second method of physically transporting a file to a computer as using, "SneakerNet" (walk over and put in disk).
Forcibly injecting a "dead" file onto a computer is more like "payload delivery" or a file "push" (as in a MS Windows/WSUS update or other types of boot-time scripted event).
Virii usually take advantage of the access they WERE granted on the computer to send outbound communications on a specific "port" and request data to be downloaded along the "data path" leading back to that same port. However, modern computers with either a software-based firewall (program), hardware-based firewall (firewall equipped router) or BOTH are going to be difficult to penetrate!
If you think of the computer as a "Tool" then the idea of using a Screw to twist a Screw Driver applies. It is sort-of a "reverse scenario" because computers are really designed to DO the browsing of a netwrok, not to be "forced" to receive data which they did not initiate the request to GET. In HTTP the "GET" procedure is a command-type thing working behind the scenes to request data from remote servers.
HTTP data traffic comes and goes on Port 80.
E-mail on Ports 25 and 110.
Most computers these days, especially Microsoft Windows XP with Service Pack 2 (SP2) or SP3 are going to appear to be fairly well "hardened" against unauthorized data pushes. Of course this is where the idea of security flaws or "exploits" get introduced - - weaknesses in the Operating System (O.S.) that individuals with computer programming skills have way of identifying and taking advantage of (i.e. forcibly exploiting). The problem with these exploits is there are organizations out there in competition with each other to professionally identify, report, receive "credit" for and (even) make money by pointing out to the software's authors before the other guy. So almost as quickly as they are identified, they may be "knocked down" or closed by means of a "Patch" (or Service Pack) being released by the software's authors.
I hope this information helps. I hope it is as good as whatever you may find on Wikipedia.org, just less wordy, and that it is of some use.
More than that I am not prepared to write about at this time. Best wishes for your research!