7 Computer Science I Quarter 1 - Module 6 Computer Viruses Computer Science I– Grade 7 Alternative Delivery Mode Quarter 1 - Module 6 : Computer Viruses First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education - Region III Secretary : Leonor M. Briones Undersecretary : Diosdado M. San Antonio Development Team of the Module Author: Carla Jean P. Pangilinan Language Reviewer: Evelyn I. Domalaon Content Editor: Marciano V. Cruz, Jr. Brenda ‘Lea A. Caranto, PhD Illustrator: Maurice Dean P. Pangilinan Layout Artist: Carla Jean P. Pangilinan Management Team Gregorio C. Quinto, Jr., EdD Chief, Curriculum Implementation Division Rainelda M. Blanco, PhD Education Program Supervisor - LRMDS Agnes R. Bernardo, PhD EPS-Division ADM Coordinator Marinella P. Garcia Sy, PhD EPS – Science Glenda S. Constantino Project Development Officer II Joannarie C. Garcia Librarian II Department of Education, Schools Division of Bulacan Curriculum Implementation Division Learning Resource Management and Development System (LRMDS) Capitol Compound, Guinhawa St., City of Malolos, Bulacan Email address: lrmdsbulacan@deped.gov.ph 7 Computer Science I Quarter 1 - Module 6 Computer Viruses Introductory Message For the facilitator: Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on Computer Viruses. This module was collaboratively designed, developed and reviewed by educators from public institutions to assist you, the teacher or facilitator, in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the Teacher This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator, you are expected to orient the learners on how to use this module. You also need to keep track of the learners’ progress while allowing them to manage their own learning. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. For the learner: Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on Computer Viruses! This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. This module has the following parts and corresponding icons: What I Need to Know This will give you an idea of the skills or competencies you are expected to learn in the module. What I Know This part includes an activity that aims to check what you already know about the lesson to take. If you get all the answers correct (100%), you may decide to skip this module. 1 What’s In This is a brief drill or review to help you link the current lesson with the previous one. What’s New In this portion, the new lesson will be introduced to you in various ways; a story, a song, a poem, a problem opener, an activity or a situation. What is It This section provides a brief discussion of the lesson. This aims to help you discover and understand new concepts and skills. What’s More This comprises activities for independent practice to solidify your understanding and skills of the topic. You may check the answers to the exercises using the Answer Key at the end of the module. What I Have Learned This includes questions or blank sentence/ paragraph to be filled in to process what you learned from the lesson. What I Can Do This section provides an activity which will help you transfer your new knowledge or skill into real life situations or concerns. Assessment This is a task which aims to evaluate your level of mastery in achieving the learning competency. Additional Activities In this portion, another activity will be given to you to enrich your knowledge or skill of the lesson learned. Answer Key This contains answers to all activities in the module. At the end of this module you will also find: References - This is a list of all sources used in developing this module. The following are some reminders in using this module: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Don’t forget to answer What I Know before moving on to the other activities included in the module. 3. Read the instruction carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are through with it. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it! 2 What I Need to Know This module encourages you to be knowledgeable about the prevention of viruses and other malicious code that affect computers. Various activities are provided for you to perform to strengthen your knowledge and skills regarding the topic. At the end of this module, you are expected to: 1. describe a computer virus; 2. state the reasons why people create computer virus; 3. identify some virus symptoms; 4. differentiate the various types of computer viruses; and 5. prevent malicious code attacks. What I Know A. Multiple Choice Directions: Choose the letter of the best answer. Write your answer on the space provided. _____1. What do you call a malicious code that infects computer by copying and replicating without the knowledge of the user? A. Malware C. Virus B. Trojan Horse D. Worms _____2. Which of the following is NOT a reason why people create viruses? A. to steal information C. to strengthen security B. to make lots of money D. to inconvenience others _____3. What type of virus can infect both boot sector and program files at the same time? A. Email C. Macro B. File D. Multipartite _____4. What does a computer virus do? A. deletes data C. damages hardware B. damage program D. all of the above 3 _____5. When was the term “computer virus” first defined? A. 1943 C. 1999 B. 1983 D. 2001 B. True or False Directions: Write T if the statement is true and F if the statement is false. Write your answer on the space provided before each number. _____6. File virus is also known as file injector. _____7. I Love You virus was created by a college Filipino student. _____8. Install multiple antivirus software to enhance your computers’ protection. _____9. Keeping your antivirus software up to date is one way of preventing malwares. _____10. All viruses can cause your computer to suddenly freeze and crash. _____11. Some people create virus to steal confidential information. _____12. Macro virus is also known as hybrid virus. _____13. Operating system software is a helpful tool in preventing viruses from bbbbb penetrating into your computer. _____14. A worm is a virus sent with or attached to email communication and spreads by automatically forwarding itself to thousands of people. _____15. Regular scanning of your computer is helpful in preventing viruses from xxxxxx penetrating your system. What’s In Directions: Arrange the jumbled letters in the diagram below and describe how an operating system works by completing the paragraph . Write your answer on the space provided. SURE _____________ GOREAITNP MTYESS ____________ _____________ CATPPAIONLI _____________ DAWARRHE _____________ In simple terms it can be said that a/an ________________________ is a piece of software that is needed to run the ________________________ on a computer or a mobile device. The programs that run on ________________________. 4 an operating system talk to the What’s New Time to search for viruses! SEARCHING... Word Hunt Directions: Search and list down 10 words/phrases associated with computer viruses from the box below. Words appear straight across, backward straight across, up and down, down and up, and diagonally. Write your answer on the blank provided. V S T U W V W T H X A O H D R R R L H O E S I G W C X R Z Z X Y M J L A K E R A W L I S M L I J C X V E L E P O I U N D G H K I O J I R U T Z X C V B K K O L F E M S L S W E P R E A L F H D F D S M A V P O W S L Z A S A M N Y R T R E W Q T A M P E H C A U O M J N R A O W H O F P H O G M N U M B V D F G S H I I N R W A A S R E W Y Q D E N Y Q O P P C O R T U O W F T N O O F I N R I P U E Y Y U F U R E O F P I N G Y I L E T R U R O T C E S T O O B 1. _________________________ 6. __________________________ 2. _________________________ 7. __________________________ 3. _________________________ 8. __________________________ 4. _________________________ 9. __________________________ 5. _________________________ 10. _________________________ Notes to the Teacher The activities in this module are designed to help learners to gradually master the desired competency. In order for him/her to perform the desired tasks and achieve the desired outcomes you need to give the support and guidance he/she needed. 5 What is It Computer Viruses We are now living in the so-called millennial era where technology is widely used. Computers, laptops, and smartphones no longer impose a status symbol; it has become a necessity. Cars today are safer and more efficient, thanks to ECU or electronic control unit. Supplies of food and drugs were distributed to different supermarkets and pharmacies every day to meet the demands, thanks to the good computerized inventory system. But, as technology advances, we also encounter a new type of threat: computer viruses. ALERT!!! VIRUS HAS BEEN DETECTED! A computer virus is a type of malicious computer program that infects a computer, it replicates by copying itself to another program without the knowledge of the user. It doesn’t occur naturally and is always brought by people. As soon as a computer virus is out, its transmission will no longer be controllable. It can insert itself to a program or file, copy itself, and harm the computer in the process. Not all viruses are destructive though, however, most of them perform wrongful actions that can sometimes destroy data on your computer. Computer virus was first defined in 1983 by Fred Cohen, a computer scientist who invented most of the widely used computer virus defense techniques. C:\_ Command Prompt C:\Users\LittleDetectives> Little detectives let us start our investigation. THINK! Why do you think people create computer viruses? List down at least 2 reasons _____________________________________________________________ _____________________________________________________________ C:\STARTING INVESTIGATION... 6 Let us check if your answers are correct. There are millions of computer viruses out there. Computer programmers, hackers, and other computer techies have various reasons in creating malicious codes. But why do people create such? 1. To earn money. Many viruses don’t really do harm at all times aside from slowing down computers. Some people create viruses to get information about the user, this information will then be sent to a person or company for them to create the malware. Afterwards, information were used to send advertisements to your computer. Advertisements come in different forms, it may be through an email or a pop-up. Oftentimes, different types of infections were concealed as free antivirus software. When executed it will scan your computer and will show some viruses were found. And to remove those, you’ll be asked to download the software and pay for the pro or premium version of the application. 2. To steal information Some people create viruses that can pass through the traffic going in and out of a computer to acquire information such as passwords, credit card number and its verification value, as well as other online account information. Imagine the damage a person can get from such malware. 3. To inconvenience others Some malwares are created to cause trouble and inconvenience to people and companies because it is entertaining and enjoyable to the people who created the malware. The network system of banks and other institutions can crash due to the effect of such malware. Did you Know? Cybercrime offenses such as hacking, computer fraud, spam, and libel are punishable by Philippine Law as stated in the Republic Act No. 10175. C:\_ Command Prompt C:\Users\LittleDetectives> C:\LEVEL 1 COMPLETE Aha! So those are their reasons. Okay detectives, let’s continue digging. How do we know that our computers are being attacked by viruses? _____________________________________________________________ _____________________________________________________________ C:\STARTING INVESTIGATION... 7 Let us check if your answers are correct. Here are the top 6 signs your Computer has a virus. 1. Slow processing and performance If you encounter a sudden change in the performance of your computers such as slow processing and a longer time in booting programs that you didn’t normally experience, your system might be infected. 2. Unexpected computer behavior If your computer starts having unusual behavior such as opening a file on its own, scrolls or acts as if a key has been pressed when it hasn’t and stops responding to clicks. Do not think it’s a ghost, you may be experiencing a computer virus symptom. 3. Sudden freezes and crashes Since some viruses target computer hard drive, it may cause damage and bring devastating effects on your computer such as sudden freezing or worst, a crash. 4. Error messages You should watch out for sudden appearance of unexpected pop-up windows. Computers know something is wrong before we even notice it. Sudden appearance of pop-up messages warning you about missing application files or system is one of the symptoms your computer is infected. 5. Missing or extra files Remember to keep track of the size of your hard drive. Some viruses may delete files unexpectedly or may install unwanted copies of itself on your computer. 6. Hardware and accessory problems Are you experiencing problems with your computer display? For instance, mixing pixels or color problems, this can be a sign that a virus has penetrated your system. 8 C:\_ Command Prompt C:\Users\LittleDetectives> C:\LEVEL 2 COMPLETE Hmm.. Interesting.. Let’s continue exploring. Can you give an example of a computer virus? __________________________________________________________________ __________________________________________________________________ C:\STARTING INVESTIGATION... Let us check if your answers are correct. Basic Computer Viruses 1. Trojan Horse Trojan horse appears as an interesting software but when installed it allows intruders to gain access on your files. 2. Worms A malicious code that copies and multiplies itself using computer networks and security flaws. I Love You or Love Bug virus is one of the well known and destructive examples of worm. 3. Email Virus An email virus is a virus that is sent with or attached to email communications. It spreads by automatically forwarding itself to thousands of people. Melissa is one of the most notorious examples of this virus. 9 Types of Computer Viruses 1. File Virus (File Infecting Virus) It is a type of malware that infects executable files with the intent to cause permanent damage or make them unusable. A file-infecting virus overwrites code or inserts infected code into an executable file. This type of virus can infect several operating systems. A file-infecting virus may also be known as a file injector. Examples of this type of virus are Jerusalem and Cascade. 2. Boot Sector Virus A boot sector virus is a computer virus that infects a storage device's master boot record (MBR). This virus copies its infected code either to the floppy disk's boot sector or to the hard disk's partition table. The propagation of boot sector viruses has become very rare since the decline of floppy disks. Also, present-day operating systems include boot-sector safeguards that make it difficult for boot sector viruses to infect them. Michaelangelo and Stoned are examples of this type of virus. 3. Multipartite Virus A multipartite virus is also known as a hybrid virus. It is a fast-moving virus that uses file infectors or boot infectors to attack the boot sector and executable files simultaneously. Most viruses either affect the boot sector, the system or the program files. The multipartite virus can affect both the boot sector and the program files at the same time, thus causing more damage than any other kind of virus. A multipartite virus infects computer systems multiple times and at different times. In order for it to be eradicated, the entire virus must be removed from the system. Examples of this type of virus are Anthrax and Tequila. 4. Macro Virus A macro virus is a computer virus that replaces a macro, which enables a program to work and activates a designated group of actions and commands. When these actions and commands are replaced by a virus, this can cause significant harm to a computer. Macro viruses may be spread through email attachments, modems and on the internet, networks, and disks. Concept is first known example of macro virus. 5. Denial of Service Attack A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. In simple terms, this attacks functions by flooding cccc c 10 targeted computers with requests, until it can no longer be processed leading to denial of service. Examples of this type of virus are Ping of Death Attack and Teardrop Attack. 6. Hoax A virus hoax is an email that provides a warning about a virus, worm, or some other disaster, and forces recipients to forward the message. Hoax emails are often sent from what appears to be a reliable source, which can make determining whether to heed their message difficult for recipients. Although such hoaxes are usually benign, they suggest that recipients delete important files from their computers or download an infected attachment. 2400 Baud Modem Virus and Good Time Virus are some of the examples of this type of virus. C:\_ Command Prompt C:\Users\LittleDetectives> C:\LEVEL 3 COMPLETE ALERT! Let us keep these viruses away from our computers. How can you prevent virus attacks? ______________________________________________________________ ______________________________________________________________ C:\STARTING INVESTIGATION... Let us check if your answers are correct. Here are some tips on how to prevent virus attacks. 1. Think, before you click. Avoid websites that you are unfamiliar with or seems unsecured. Be cautious when you access such sites and as a rule if you don’t know it, don’t click it. 2. Hands off with unfamiliar messages Do not open messages from unfamiliar sources. By doing this you’ll be able to protect your computer from viruses that hide or camouflage themselves as an email attachment. 11 3. Increase external security Do not let other people use your computer without your permission. Though we know that sharing is caring when it comes to a computer you might want to think twice. Not all people are knowledgeable on the prevention of computer viruses, so sharing your computer with others might cause you big damage like corruption of your data or worst, a total system failure. 4. Never download unrecognized files or software Be cautious about the different free software offered online especially files with .exe extension. Music, videos, and pictures from untrusted sources may also contain malware. 5. Keep your anti virus software up-to-date Antivirus software is a helpful tool in preventing viruses from penetrating your computer. Antivirus software may be bought online or in a trusted physical store. Regularly update your antivirus for it to function at its best. Software update increases the capability of your antivirus against new malware. It contains the latest file needed in order for your computer to combat such threats. To maximize your antivirus be sure to scan your computer regularly to check for any malware present in your system. Do not install multiple antivirus software. You are responsible for keeping your computer clean of viruses. To do that always remember to THINK. C:\_ Command Prompt C:\Users\LittleDetectives> C:\LEVEL 4 COMPLETE C:\INVESTIGATION COMPLETED C:\VIRUSES ELIMINATED HOORAY! Good Job detectives. You are now ready for the next phase. Time to check your understanding. 12 What’s More Independent Activity 1 Describe Me! Directions: Complete the concept map below by describing a computer virus. Write your answer on the space provided. ___________________ ___________________ ___________________ ___________________ COMPUTER VIRUS ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ Based on your descriptions above, how will you define a computer virus? _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ 13 Independent Assessment 1 A. Multiple Choice Directions: Choose the letter of the best answer. Write your answers on the space provided before each number. _____1. Who is the first person to define computer virus? A. Ada Byron C. Fred Cohen B. Charles Babbage D. Frederick Collen _____2. What do you call a malicious code that infects computer by copying and replicating without the knowledge of the user? A. Malware C. Virus B. Trojan Horse D. Worms _____3. Alex enjoys creating malicious codes that can cause trouble for some companies and people. What do you think is the reason why Alex created such codes? A. to earn money C. to inconvenience others B. to steal information D. none of the above _____4. Zara creates viruses that specify in keystroke logging to capture passwords, credit card number, and verification value. What do you think is the reason why Zara created such virus? A. to earn money C. to inconvenience others B. to steal information D. none of the above _____5. John creates software that masks itself as free antivirus software which in time will ask the user to upgrade to premium or pro version by paying monthly or annually. What do you think is the reason why John creates such virus? A. to earn money C. to inconvenience others B. to steal information D. none of the above B. Fact or Bluff Directions: Write F if the statement is a fact and B if the statement is a bluff. _____1. All viruses are malwares but not all malwares are viruses. _____2. Computer virus was first defined in 1993. _____3. Some people create viruses to earn money. _____4. Enjoyment and enthusiasm are some of the reasons why people create malicious codes. _____5. Programs that secretly acquire personal information and account details is helpful to your computer. 14 Independent Activity 2 Picture Me Out! A. Directions: Analyze the pictures shown below and identify the different virus symptoms present. Write your answer on the space provided. 1. __________________ 2. __________________ 4. __________________ 5. __________________ 3. __________________ B. Directions: Identify and describe the following examples of computer viruses based on the given illustrations. Write your answer on the space provided. 1.______________________ ______________________________________________ ______________________________________________ 2.______________________ ______________________________________________ ______________________________________________ 3.______________________ - _____________________________________________ _____________________________________________ 4.______________________ _____________________________________________ _____________________________________________ 5.______________________ _____________________________________________ _____________________________________________ 15 Independent Assessment 2 A. Matchy - Matchy! Directions: Match Column A to Column B. Write the letter of your answer on the space provided. COLUMN A COLUMN B _____1. a type of virus that infects a A. Boot Sector Virus B. Denial of Service (DoS) storage device's master boot record C. Email Virus _____2. it is also known as a hybrid virus D. File Virus _____3. it is a virus that is sent with or E. Hoax attached to email communications F. Macro Virus _____4. it is a type of malware that infects G. Multipartite Virus executable files with the intent to cause permanent damage or make them unusable _____5. it is a type of virus attacks that floods targeted computers with requests, until it can no longer be processed B. You Complete Me! Directions: Complete the table below by supplying the missing term. Write your answer on the space provided. Type of Virus 1 Example Hoax 2 Teardrop Attack 3 Jerusalem 4 Macro 5 Boot Sector 16 Independent Activity 3 Violators! Directions: Analyze the given situations below and identify which among the tips in preventing computer viruses has not been followed and give a short explanation of your answer. Write your answer on the blank provided. Situation 1 Amanda bought a personal computer for her son. Her son, Anton, is very fond of computer games so he looked for free software on the web for his favorite basketball game. Answer: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Situation 2 Amelia is currently writing her thesis for her graduate studies. She is afraid of losing her files so she installed three antivirus software to increase her computers protection. Answer: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Situation 3 Mike has been receiving several emails from his friends with the same attachments . Out of his curiosity, he decided to open one of the messages. Answer: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Situation 4 While browsing on the web, Mars saw a pop-up indicating that he won a raffle m 17 draw. Due to his excitement he immediately clicked the said pop-up. Answer: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Situation 5 Claire leaves her laptop unattended and allows her friends to use it whenever they need it. Answer: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Independent Assessment 3 A. Modified True or False Directions: Write TRUE if the statement is correct. In case it is false, CHANGE the underlined word or phrase to make the statement correct. Write your answer on the space provided. _________________1. Be cautious when you access unfamiliar sites and as a rule if you don’t know it don’t click it.. _________________2. Always open messages even from unfamiliar sources. _________________3. It is a must to update your anti virus software whenever an update is available. _________________4. All people are knowledgeable on the prevention of computer mmmm viruses. _________________5. Music, videos and pictures from untrusted sources may also nnnnnn contain malware. B. Do’s or Don’ts Directions: Write DO if the action helps protect your computer and DON’T if the action can harm your computer. Write your answer on the space provided. ___________1. Always update your anti virus software. ___________2. Download multiple anti virus software. ___________3. Download music, movies and games from any internet website. 18 ___________4. Allow other people to use your computer with your supervision. ___________5. Access unfamiliar and unsecured websites to download files. What I Have Learned What level are you? Directions: Using the given rubrics below, try to assess the level of your understanding regarding the different topics presented in this module. Encircle the level of understanding in which you feel you are into. Scale Level of Understanding Description I have a high understanding of all the topics 5 Outstanding with no mistakes in the activities and assessment I have a high understanding of most of the 4 High topics with small mistakes in the activities and assessments I understand most of the topics but I still need 3 Moderate a little improvement in the activities and assessments I have basic understanding of the topics, but I 2 Low still need to review and retake some activities and assessments I have no understanding of the topics. I need 1 None to review and retake all the activities and assessments 19 Topics in the module Scale 1. I can describe a computer virus 2. I can state the reasons why people create computer viruses. 3. I can identify some virus symptoms. 4. I can differentiate and give examples of computer viruses. 5. I can prevent malicious code attacks 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 What I Can Do Co-Virus Directions: We are currently facing a pandemic due to a virus called “Corona”, using a Venn diagram, show the similarities and differences of computer virus and corona virus. Corona Virus Computer Virus 20 Assessment A. Multiple Choice Directions: Choose the letter of the best answer. Write your answer on the space provided before each number. _____1. How will you describe a computer virus? A. destructive B. destroys data C. malicious computer program D. all of the above ______2. Which statement about computer virus is true? A. it boosts your computer B. all virus are destructive C. virus can occur naturally D. it can replicate by copying itself on another program ______3. Which among the following is a sign that your computer might be infected by a virus? A. freezes and crashes often B. unexpected computer behavior C. slow processing and performance D. all of the above ______4. How can you prevent a computer virus from entering your computer? A. by installing multiple antivirus software B. by avoiding unfamiliar/unsecured websites C. by saving username and password on the browser D. all of the above 21 _____5. What malware appears as an interesting software but when installed, allows intruders to gain access on your files? A. Email virus B. Boot sector C. Trojan horse D. Worms B. Identification Directions: Read the following statements carefully and identify what is being described. Write your answer on the space provided before each number __________________1. An email that provides a warning about a virus, worm or vvvvvvvvvvv some other disaster, and urges recipients to forward the ccccccccc message. __________________2. It is a type of malware that infects executable files with the xxxxxxx intent to cause permanent damage or make them unusable. __________________3. A type of malicious computer program that infects computer, vvvvvvvvv it replicates by copying itself to another program without the ccccccccccccccccc knowledge of the user. __________________4. It is a fast-moving virus that uses file infectors or boot cccccccc infectors to attack the boot sector and executable files cccccccc simultaneously. __________________5. A malicious code that copies and multiplies itself using cccccccccc computer networks and security flaws. __________________6. A helpful tool in preventing viruses from penetrating into your VVVV computer. __________________7. Any type of attack where the attackers (hackers) attempt to VVVVVV prevent legitimate users from accessing the service. __________________8. A file-infecting virus may also be known as a ____________. __________________9. It is one of the well known and destructive example of worm VVVV created by a Filipino college student. __________________10. These viruses copy their infected code either to the floppy VVVV disk's boot sector or to the hard disk's partition table. 22 Additional Activities Let’s Organize! Directions: Fill out the missing terms in the graphic organizer below. Write your answer on the box provided. Computer Virus Types Symptoms 23 Prevention 24 What I Know B 5. D 4. D 3. C 2. C 1. Multiple Choice A. What is it Guide Question 1 - (answers may vary) Guide Question 2 - (answers may vary) Guide Question 2 - (answers may vary) Guide Question 2 - (answers may vary) What’s More Independent Activity 1 B. True or False T 9. F 8. T 7. T 6. Describe Me! (answers may vary) Possible Answers 10. F 11. T 12. F Performs malicious action 5. Used to steal information 4. Man-made 3. replicates by copying itself 2. Can be destructive 1. Follow-up question (answers may vary) 13. F Sample Answer 14. F A computer virus is man-made and can replicate by copying itself. It performs malicious 15. T action which can be destructive like stealing What’s In information. (From left to right) Independent Assessment 1 User, Application, Operating system, Hardware In simple terms it can be said that a/an operating system is a piece of software that is needed to run the applications on a computer or a mobile device. The programs that run on an operating system talk to the hardware. What’s New (Word Hunt) A 5. B 4. C 3. C 2. C 1. Multiple Choice A. B. Fact of Bluff V S T U W V W T Z X Y M I N R H I X A O H D R R R L H O E S G W C X R Z A O W H O F P H O G M N U M B V J C X V E Z A S L D F G S H J A K L E P O I U E R A W L A M N Y R T R E W Q I S T A M P E H C A Z X C V B M L N D G H I O J K K O L A L I U O M J K I R U T F H D F D S M A V P O W S F E M I N R W S L S W E P R E L A A S R E W Y Q D E N Y Q O P P C O R T U O W F T N O O F I N R I N G Y P U E Y Y U F U R E O F I L E P I T R U R O T C E S T O O B B 5. F 4. F 3. B 2. F 1. Answer Key 25 Independent Activity 2 Independent Activity 3 Picture Me Out Violators! A. Sudden freezes and crashes 5. Hardware and accessory problems 4. Slow processing and performnace 3. Error messages 2. 1. Unexpected computer behavior A. B. Increase external security. (explanations may 5. Think before you click. (explanations may vary) 4. Hands-off with unfamiliar (explanations may vary) 3. D 4. C 3. G 2. A 1. Matchy Matchy! A. Keep your antivirus software up to date. (explanations may vary) 2. Never download unrecognized software. (explanations may vary) 1. files or messages. vary) 1. Worms A malicious code that copies and multiplies itself using computer networks and security flaws. Independent Assessment 3 A. Modified True or False 2. Email Virus An email virus is a virus that is sent with or attached to email communications. It spreads by automatically forwarding itself to thousands of people. 3. Trojan Horse Trojan horse appears as an interesting software but when installed it allows intruders to gain access on your files. TRUE 5. Not all 4. TRUE 3. Do not open 2. TRUE 1. B. Do’s or Don’ts 4. File Virus (File Infecting Virus) It is a type of malware that infects executable files with the intent to cause permanent damage or make them unusable. 5. Hoax A virus hoax is an email that provides a warning about a virus, worm or some other Don’t 5. Do 4. Don’t 3. Don’t 2. Do 1. What I Have Learned disaster, and urges recipients to forward the What level are you? message. (answers may vary) Independent Assessment 2 B 5. What I Can Do Co-Virus (answers may vary) Assessment B. You Complete Me! Michaelangelo or Stoned 5. Concept 4. File Virus 3. Denial of Service 2. 2400 Baud Modem Virus or Good Time Virus 1. C 5. B 4. D 3. D 2. D 1. Multiple Choice A. 26 B. Identification I love you virus or Love you Love bug 9. File Infector 8. Denial of Service 7. Antivirus software 6. Worms 5. Multipartite 4. Computer Virus or Virus 3. File Virus 2. Hoax 1. 10. Boot Sector Virus Additional Activities Let’s Organize Types File Infector Boot Sector Multipartite Macro Denial of Service Hoax Signs / Symptoms Slow Processing and performance Unexpected computer behavior Sudden freezes and crashes Error Messages Missing or extra files Hardware and accessory Problems Prevention Think before you click Hands-off with unfamiliar messages Increase external security Never download unrecognized files or software Keep your antivirus software up to date References Bennett, Coleman & Co. Ltd. “Definition of 'Computer Virus'” The Economic Times. Accessed June 30,2020, https://economictimes.indiatimes.com/definition/computer% 20virus Technibble. “Why do People Create Computer Viruses?” Technibble. Accessed July 01, 2020, https://www.technibble.com/why-do-people-create-computer-viruses/?fbcli d=IwAR3QcLI_5NiHdi_cC5-hO1_uAIiA15mDP_967bHAJdCU2jjYGH4rttgjKa8 Computer Hope. “Why do people create viruses and malware?” Computer Hope. Accessed July 01, 2020, https://www.computerhope.com/issues/ch001404.htm?fbclid=IwAR1 Gv1Guq52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg Benton, Bryan. “10 Tips on How to Prevent Malware From Infecting Your Computer—and Your Livelihood.” Autodesk. Accessed July 03, 2020, https://www.autodesk.com/ redshift/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/?fbclid=IwA R0678r0BVnb8N2Ay8w_yXRrwywt0lvJUqJH4TLzeotUjPbWJXgTwoj3Efk Devtelx. “Know How To Avoid Computer Virus Attacks.” Telx. Accessed July 05,2020, https://www.telxcomputers.com/avoid-computer-virus-attacks/?fbclid=IwAR1Gv1Guq 52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg Spam Laws. “The Common Types of Computer Viruses.” SpamLaws. Accessed July 06,2020, https://www.spamlaws.com/virus-comtypes.html?fbclid=IwAR2NcnGuY-Lee PpArocURgjAeK5e6K452JkIteDAmTeQ7KP6pzma-IBKQW0 Computer Hope. “Macro virus.” Computer Hope. Accessed July 06, 2020. https:// www.computerhope.com/jargon/m/mvirus.htm?fbclid=IwAR0ZJ3Uf0W3-X6ijqqaAPPjf uWlOwAlslwfLqFrtKfESluH334X1JfuMeHg SQA. “Internet Safety: Viruses.” Sqasolar. Accessed July 06,2020. https:// www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm?fbclid=IwAR1WQJho o3Z9QDj9K5Ju75p-3PyrfpDqprAyZIohc_1WAJuLNS-sSnVomyI 27 For inquiries or feedback, please write or call: Department of Education, Schools Division of Bulacan Curriculum Implementation Division Learning Resource Management and Development System (LRMDS) Capitol Compound, Guinhawa St., City of Malolos, Bulacan Email address: lrmdsbulacan@deped.gov.ph