Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

7

Computer Science I
Quarter 1 - Module 6
Computer Viruses
Computer Science I– Grade 7
Alternative Delivery Mode
Quarter 1 - Module 6 : Computer Viruses
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall


subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created
shall be necessary for exploitation of such work for profit. Such agency or
office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos,


brand names, trademarks, etc.) included in this book are owned by their
respective copyright holders. Every effort has been exerted to locate and
seek permission to use these materials from their respective copyright
owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education - Region III


Secretary : Leonor M. Briones
Undersecretary : Diosdado M. San Antonio

Development Team of the Module

Author: Carla Jean P. Pangilinan


Language Reviewer: Evelyn I. Domalaon
Content Editor: Marciano V. Cruz, Jr.
Brenda ‘Lea A. Caranto, PhD
Illustrator: Maurice Dean P. Pangilinan
Layout Artist: Carla Jean P. Pangilinan
Management Team
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Rainelda M. Blanco, PhD
Education Program Supervisor - LRMDS
Agnes R. Bernardo, PhD
EPS-Division ADM Coordinator
Marinella P. Garcia Sy, PhD
EPS – Science
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph
7
Computer Science I
Quarter 1 - Module 6
Computer Viruses
Introductory Message

For the facilitator:


Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on
Computer Viruses.

This module was collaboratively designed, developed and reviewed by educators from
public institutions to assist you, the teacher or facilitator, in helping the learners meet the
standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire
the needed 21st century skills while taking into consideration their needs and
circumstances.

In addition to the material in the main text, you will also see this box in the body of the
module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own
learning. Furthermore, you are expected to encourage and assist the learners as they do
the tasks included in the module.

For the learner:


Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on
Computer Viruses!
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.
This module has the following parts and corresponding icons:

This will give you an idea of the skills or


What I Need to Know competencies you are expected to learn in the
module.

This part includes an activity that aims to check


what you already know about the lesson to take. If
What I Know
you get all the answers correct (100%), you may
decide to skip this module.

1
This is a brief drill or review to help you link the
What’s In
current lesson with the previous one.

In this portion, the new lesson will be introduced to


What’s New you in various ways; a story, a song, a poem, a
problem opener, an activity or a situation.
This section provides a brief discussion of the
What is It lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice to
solidify your understanding and skills of the topic.
What’s More
You may check the answers to the exercises using
the Answer Key at the end of the module.
This includes questions or blank sentence/
What I Have Learned paragraph to be filled in to process what you learned
from the lesson.
This section provides an activity which will help you
What I Can Do transfer your new knowledge or skill into real life
situations or concerns.

This is a task which aims to evaluate your level of


Assessment
mastery in achieving the learning competency.

In this portion, another activity will be given to you to


Additional Activities
enrich your knowledge or skill of the lesson learned.

Answer Key This contains answers to all activities in the module.

At the end of this module you will also find:


References - This is a list of all sources used in developing this module.
The following are some reminders in using this module:
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!

2
What I Need to Know

This module encourages you to be knowledgeable about the prevention of viruses and
other malicious code that affect computers. Various activities are provided for
you to perform to strengthen your knowledge and skills regarding the topic.

At the end of this module, you are expected to:


1. describe a computer virus;
2. state the reasons why people create computer virus;
3. identify some virus symptoms;
4. differentiate the various types of computer viruses; and
5. prevent malicious code attacks.

What I Know

A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space provided.

_____1. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?

A. Malware C. Virus
B. Trojan Horse D. Worms
_____2. Which of the following is NOT a reason why people create viruses?

A. to steal information C. to strengthen security


B. to make lots of money D. to inconvenience others
_____3. What type of virus can infect both boot sector and program files at the same time?
A. Email C. Macro
B. File D. Multipartite
_____4. What does a computer virus do?
A. deletes data C. damages hardware
B. damage program D. all of the above

3
_____5. When was the term “computer virus” first defined?

A. 1943 C. 1999
B. 1983 D. 2001

B. True or False

Directions: Write T if the statement is true and F if the statement is false. Write your
answer on the space provided before each number.
_____6. File virus is also known as file injector.

_____7. I Love You virus was created by a college Filipino student.

_____8. Install multiple antivirus software to enhance your computers’ protection.

_____9. Keeping your antivirus software up to date is one way of preventing malwares.

_____10. All viruses can cause your computer to suddenly freeze and crash.
_____11. Some people create virus to steal confidential information.

_____12. Macro virus is also known as hybrid virus.

_____13. Operating system software is a helpful tool in preventing viruses from


bbbbb penetrating into your computer.

_____14. A worm is a virus sent with or attached to email communication and spreads by
automatically forwarding itself to thousands of people.

_____15. Regular scanning of your computer is helpful in preventing viruses from


xxxxxx penetrating your system.

What’s In

Directions: Arrange the jumbled letters in the diagram below and describe how an
operating system works by completing the paragraph . Write your answer on
the space provided.

GOREAITNP
SURE CATPPAIONLI MTYESS DAWARRHE
_____________ _____________ ____________ _____________
_____________

In simple terms it can be said that a/an ________________________ is a piece of


software that is needed to run the ________________________ on a computer or a mobile
device. The programs that run on an operating system talk to the
________________________.

4
What’s New

Time to search for viruses!

SEARCHING...

Word Hunt
Directions: Search and list down 10 words/phrases associated with computer viruses from
the box below. Words appear straight across, backward straight across, up and
down, down and up, and diagonally. Write your answer on the blank provided.

V S T U W V W T Z X Y M I N R
H I X A O H D R R R L H O E S
G W C X R Z A O W H O F P H O
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U
E R A W L A M N Y R T R E W Q
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B

1. _________________________ 6. __________________________

2. _________________________ 7. __________________________

3. _________________________ 8. __________________________

4. _________________________ 9. __________________________

5. _________________________ 10. _________________________

Notes to the Teacher


The activities in this module are designed to help learners to gradually master the
desired competency. In order for him/her to perform the desired tasks and achieve
the desired outcomes you need to give the support and guidance he/she needed.

5
What is It

Computer Viruses
We are now living in the so-called millennial era where technology is widely used.
Computers, laptops, and smartphones no longer impose a status symbol; it has become a
necessity. Cars today are safer and more efficient, thanks to ECU or electronic control
unit. Supplies of food and drugs were distributed to different supermarkets and
pharmacies every day to meet the demands, thanks to the good computerized inventory
system. But, as technology advances, we also encounter a new type of threat: computer
viruses.

ALERT!!!
VIRUS HAS BEEN DETECTED!

A computer virus is a type of malicious computer program that infects a computer, it


replicates by copying itself to another program without the knowledge of the user. It
doesn’t occur naturally and is always brought by people. As soon as a computer virus is
out, its transmission will no longer be controllable. It can insert itself to a program or file,
copy itself, and harm the computer in the process. Not all viruses are destructive though,
however, most of them perform wrongful actions that can sometimes destroy data on your
computer. Computer virus was first defined in 1983 by Fred Cohen, a computer scientist
who invented most of the widely used computer virus defense techniques.

C:\_ Command Prompt


C:\Users\LittleDetectives>

Little detectives let us start our investigation.

THINK!

Why do you think people create computer viruses? List down at least 2 reasons

_____________________________________________________________

_____________________________________________________________

C:\STARTING INVESTIGATION...

6
Let us check if your answers are correct.

There are millions of computer viruses out there. Computer


programmers, hackers, and other computer techies have various
reasons in creating malicious codes. But why do people create
such?
1. To earn money.
Many viruses don’t really do harm at all times aside from slowing down computers.
Some people create viruses to get information about the user, this information will then be
sent to a person or company for them to create the malware. Afterwards, information were
used to send advertisements to your computer. Advertisements come in different forms, it
may be through an email or a pop-up.

Oftentimes, different types of infections were concealed as free antivirus software.


When executed it will scan your computer and will show some viruses were found. And to
remove those, you’ll be asked to download the software and pay for the pro or premium
version of the application.
2. To steal information
Some people create viruses that can pass through the traffic going in and out of a
computer to acquire information such as passwords, credit card number and its verification
value, as well as other online account information. Imagine the damage a person can get
from such malware.

3. To inconvenience others
Some malwares are created to cause trouble and inconvenience to people and
companies because it is entertaining and enjoyable to the people who created the
malware. The network system of banks and other institutions can crash due to the effect of
such malware.
Did you Know?
Cybercrime offenses such as hacking, computer fraud, spam, and libel
are punishable by Philippine Law as stated in the Republic Act No. 10175.

C:\_ Command Prompt


C:\Users\LittleDetectives>

C:\LEVEL 1 COMPLETE

Aha! So those are their reasons. Okay detectives, let’s continue digging.
How do we know that our computers are being attacked by viruses?
_____________________________________________________________
_____________________________________________________________
C:\STARTING INVESTIGATION...

7
Let us check if your answers are correct.

Here are the top 6 signs your Computer has a virus.

1. Slow processing and performance

If you encounter a sudden change in the performance of


your computers such as slow processing and a longer time in
booting programs that you didn’t normally experience, your
system might be infected.

2. Unexpected computer behavior

If your computer starts having unusual behavior such as


opening a file on its own, scrolls or acts as if a key has been
pressed when it hasn’t and stops responding to clicks. Do not
think it’s a ghost, you may be experiencing a computer virus
symptom.

3. Sudden freezes and crashes

Since some viruses target computer hard drive, it may


cause damage and bring devastating effects on your computer
such as sudden freezing or worst, a crash.

4. Error messages
You should watch out for sudden appearance of
unexpected pop-up windows. Computers know something is
wrong before we even notice it. Sudden appearance of pop-up
messages warning you about missing application files or
system is one of the symptoms your computer is infected.

5. Missing or extra files


Remember to keep track of the size of your hard drive.
Some viruses may delete files unexpectedly or may install
unwanted copies of itself on your computer.

6. Hardware and accessory problems


Are you experiencing problems with your computer
display? For instance, mixing pixels or color problems, this can
be a sign that a virus has penetrated your system.

8
C:\_ Command Prompt

C:\Users\LittleDetectives>

C:\LEVEL 2 COMPLETE

Hmm.. Interesting.. Let’s continue exploring.

Can you give an example of a computer virus?

__________________________________________________________________

__________________________________________________________________

C:\STARTING INVESTIGATION...

Let us check if your answers are correct.

Basic Computer Viruses

1. Trojan Horse

Trojan horse appears as an interesting software but


when installed it allows intruders to gain access on your files.

2. Worms

A malicious code that copies and multiplies itself using


computer networks and security flaws. I Love You or Love Bug
virus is one of the well known and destructive examples of
worm.

3. Email Virus

An email virus is a virus that is sent with or attached to


email communications. It spreads by automatically forwarding
itself to thousands of people. Melissa is one of the most
notorious examples of this virus.

9
Types of Computer Viruses

1. File Virus (File Infecting Virus)

It is a type of malware that infects executable files with the intent to cause permanent
damage or make them unusable. A file-infecting virus overwrites code or inserts infected
code into an executable file. This type of virus can infect several operating systems. A
file-infecting virus may also be known as a file injector. Examples of this type of virus are
Jerusalem and Cascade.

2. Boot Sector Virus

A boot sector virus is a computer virus that infects a storage device's master boot
record (MBR). This virus copies its infected code either to the floppy disk's boot sector or
to the hard disk's partition table. The propagation of boot sector viruses has become very
rare since the decline of floppy disks. Also, present-day operating systems include
boot-sector safeguards that make it difficult for boot sector viruses to infect them.
Michaelangelo and Stoned are examples of this type of virus.

3. Multipartite Virus

A multipartite virus is also known as a hybrid virus. It is a fast-moving virus that uses
file infectors or boot infectors to attack the boot sector and executable files simultaneously.
Most viruses either affect the boot sector, the system or the program files. The multipartite
virus can affect both the boot sector and the program files at the same time, thus causing
more damage than any other kind of virus. A multipartite virus infects computer systems
multiple times and at different times. In order for it to be eradicated, the entire virus must
be removed from the system. Examples of this type of virus are Anthrax and Tequila.

4. Macro Virus

A macro virus is a computer virus that replaces a macro, which enables a program
to work and activates a designated group of actions and commands. When these actions
and commands are replaced by a virus, this can cause significant harm to a computer.
Macro viruses may be spread through email attachments, modems and on the internet,
networks, and disks. Concept is first known example of macro virus.

5. Denial of Service Attack

A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt
to prevent legitimate users from accessing the service. In a DoS attack, the attacker
usually sends excessive messages asking the network or server to authenticate requests
that have invalid return addresses. In simple terms, this attacks functions by flooding
cccc c

10
targeted computers with requests, until it can no longer be processed leading to denial of
service. Examples of this type of virus are Ping of Death Attack and Teardrop Attack.

6. Hoax

A virus hoax is an email that provides a warning about a virus, worm, or some other
disaster, and forces recipients to forward the message. Hoax emails are often sent from
what appears to be a reliable source, which can make determining whether to heed their
message difficult for recipients. Although such hoaxes are usually benign, they suggest
that recipients delete important files from their computers or download an infected
attachment. 2400 Baud Modem Virus and Good Time Virus are some of the examples of
this type of virus.

C:\_ Command Prompt

C:\Users\LittleDetectives>

C:\LEVEL 3 COMPLETE

ALERT! Let us keep these viruses away from our computers.


How can you prevent virus attacks?
______________________________________________________________
______________________________________________________________

C:\STARTING INVESTIGATION...

Let us check if your answers are correct.

Here are some tips on how to prevent virus attacks.

1. Think, before you click.


Avoid websites that you are unfamiliar with or seems unsecured. Be cautious when
you access such sites and as a rule if you don’t know it, don’t click it.

2. Hands off with unfamiliar messages


Do not open messages from unfamiliar sources. By doing this you’ll be able to
protect your computer from viruses that hide or camouflage themselves as an email
attachment.

11
3. Increase external security
Do not let other people use your computer without your permission. Though we
know that sharing is caring when it comes to a computer you might want to think twice. Not
all people are knowledgeable on the prevention of computer viruses, so sharing your
computer with others might cause you big damage like corruption of your data or worst, a
total system failure.

4. Never download unrecognized files or software


Be cautious about the different free software offered online especially files with .exe
extension. Music, videos, and pictures from untrusted sources may also contain malware.

5. Keep your anti virus software up-to-date


Antivirus software is a helpful tool in preventing viruses from penetrating your
computer. Antivirus software may be bought online or in a trusted physical store.
Regularly update your antivirus for it to function at its best. Software update
increases the capability of your antivirus against new malware. It contains the latest file
needed in order for your computer to combat such threats. To maximize your antivirus be
sure to scan your computer regularly to check for any malware present in your system. Do
not install multiple antivirus software.

You are responsible for keeping your computer


clean of viruses. To do that always remember
to THINK.

C:\_ Command Prompt

C:\Users\LittleDetectives>
C:\LEVEL 4 COMPLETE

C:\INVESTIGATION COMPLETED
C:\VIRUSES ELIMINATED

HOORAY! Good Job detectives. You are now ready for the
next phase. Time to check your understanding.

12
What’s More

Independent Activity 1
Describe Me!

Directions: Complete the concept map below by describing a computer virus. Write your
answer on the space provided.

___________________

___________________
___________________

___________________

COMPUTER
VIRUS
___________________

___________________

___________________

___________________

___________________

___________________

Based on your descriptions above, how will you define a computer virus?

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

13
Independent Assessment 1
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answers on the space
provided before each number.

_____1. Who is the first person to define computer virus?


A. Ada Byron C. Fred Cohen
B. Charles Babbage D. Frederick Collen
_____2. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?
A. Malware C. Virus
B. Trojan Horse D. Worms
_____3. Alex enjoys creating malicious codes that can cause trouble for some companies
and people. What do you think is the reason why Alex created such codes?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above
_____4. Zara creates viruses that specify in keystroke logging to capture passwords,
credit card number, and verification value. What do you think is the reason why Zara
created such virus?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above
_____5. John creates software that masks itself as free antivirus software which in time
will ask the user to upgrade to premium or pro version by paying monthly or annually.
What do you think is the reason why John creates such virus?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above

B. Fact or Bluff
Directions: Write F if the statement is a fact and B if the statement is a bluff.

_____1. All viruses are malwares but not all malwares are viruses.
_____2. Computer virus was first defined in 1993.
_____3. Some people create viruses to earn money.
_____4. Enjoyment and enthusiasm are some of the reasons why people create malicious
codes.
_____5. Programs that secretly acquire personal information and account details is helpful
to your computer.
14
Independent Activity 2
Picture Me Out!
A. Directions: Analyze the pictures shown below and identify the different virus symptoms
present. Write your answer on the space provided.

1. __________________ 2. __________________

4. __________________

3. __________________ 5. __________________

B. Directions: Identify and describe the following examples of computer viruses based on
the given illustrations. Write your answer on the space provided.

1.______________________ -
______________________________________________
______________________________________________

2.______________________ -
______________________________________________
______________________________________________

3.______________________ -
_____________________________________________
_____________________________________________

4.______________________ -
_____________________________________________
_____________________________________________

5.______________________ -
_____________________________________________
_____________________________________________

15
Independent Assessment 2
A. Matchy - Matchy!
Directions: Match Column A to Column B. Write the letter of your answer on the space
provided.

COLUMN A COLUMN B

_____1. a type of virus that infects a A. Boot Sector Virus

storage device's master boot record B. Denial of Service (DoS)


C. Email Virus
_____2. it is also known as a hybrid virus
D. File Virus
_____3. it is a virus that is sent with or
E. Hoax
attached to email communications
F. Macro Virus
_____4. it is a type of malware that infects
G. Multipartite Virus
executable files with the intent to
cause permanent damage or make
them unusable

_____5. it is a type of virus attacks that


floods targeted computers with
requests, until it can no longer be
processed

B. You Complete Me!


Directions: Complete the table below by supplying the missing term. Write your answer
on the space provided.

Type of Virus Example

1 Hoax

2 Teardrop Attack

3 Jerusalem

4 Macro

5 Boot Sector

16
Independent Activity 3

Violators!

Directions: Analyze the given situations below and identify which among the tips in
preventing computer viruses has not been followed and give a short
explanation of your answer. Write your answer on the blank provided.

Situation 1

Amanda bought a personal computer for her son. Her son, Anton, is very fond
of computer games so he looked for free software on the web for his favorite
basketball game.

Answer: _________________________________________________________________

_________________________________________________________________

_________________________________________________________________

Situation 2

Amelia is currently writing her thesis for her graduate studies. She is afraid of
losing her files so she installed three antivirus software to increase her computers
protection.

Answer: _________________________________________________________________

_________________________________________________________________

_________________________________________________________________

Situation 3

Mike has been receiving several emails from his friends with the same
attachments . Out of his curiosity, he decided to open one of the messages.

Answer: _________________________________________________________________

_________________________________________________________________

_________________________________________________________________

Situation 4

While browsing on the web, Mars saw a pop-up indicating that he won a raffle
m

17
draw. Due to his excitement he immediately clicked the said pop-up.

Answer: _________________________________________________________________

_________________________________________________________________

_________________________________________________________________

Situation 5

Claire leaves her laptop unattended and allows her friends to use it whenever
they need it.

Answer: _________________________________________________________________

_________________________________________________________________

_________________________________________________________________

Independent Assessment 3
A. Modified True or False
Directions: Write TRUE if the statement is correct. In case it is false, CHANGE the
underlined word or phrase to make the statement correct. Write your answer
on the space provided.

_________________1. Be cautious when you access unfamiliar sites and as a rule if you
don’t know it don’t click it..

_________________2. Always open messages even from unfamiliar sources.


_________________3. It is a must to update your anti virus software whenever an update
is available.

_________________4. All people are knowledgeable on the prevention of computer


mmmm viruses.

_________________5. Music, videos and pictures from untrusted sources may also
nnnnnn contain malware.

B. Do’s or Don’ts
Directions: Write DO if the action helps protect your computer and DON’T if the action
can harm your computer. Write your answer on the space provided.

___________1. Always update your anti virus software.

___________2. Download multiple anti virus software.

___________3. Download music, movies and games from any internet website.

18
___________4. Allow other people to use your computer with your supervision.

___________5. Access unfamiliar and unsecured websites to download files.

What I Have Learned

What level are you?

Directions: Using the given rubrics below, try to assess the level of your
understanding regarding the different topics presented in this module.
Encircle the level of understanding in which you feel you are into.

Level of Un-
Scale Description
derstanding

I have a high understanding of all the topics


5 Outstanding with no mistakes in the activities and
assessment

I have a high understanding of most of the


4 High topics with small mistakes in the activities
and assessments

I understand most of the topics but I still need


3 Moderate a little improvement in the activities and
assessments

I have basic understanding of the topics, but I


2 Low still need to review and retake some activities
and assessments

I have no understanding of the topics. I need


1 None to review and retake all the activities and
assessments

19
Topics in the module Scale

1. I can describe a computer virus 1 2 3 4 5

2. I can state the reasons why people create


1 2 3 4 5
computer viruses.

3. I can identify some virus symptoms. 1 2 3 4 5

4. I can differentiate and give examples of com-


1 2 3 4 5
puter viruses.

5. I can prevent malicious code attacks 1 2 3 4 5

What I Can Do

Co-Virus

Directions: We are currently facing a pandemic due to a virus called “Corona”, using
a Venn diagram, show the similarities and differences of computer virus
and corona virus.

Computer Corona
Virus
Virus

20
Assessment

A. Multiple Choice

Directions: Choose the letter of the best answer. Write your answer on the space
provided before each number.

_____1. How will you describe a computer virus?

A. destructive

B. destroys data

C. malicious computer program

D. all of the above

______2. Which statement about computer virus is true?

A. it boosts your computer

B. all virus are destructive

C. virus can occur naturally

D. it can replicate by copying itself on another program

______3. Which among the following is a sign that your computer might be infected by
a virus?

A. freezes and crashes often

B. unexpected computer behavior

C. slow processing and performance

D. all of the above

______4. How can you prevent a computer virus from entering your computer?

A. by installing multiple antivirus software

B. by avoiding unfamiliar/unsecured websites

C. by saving username and password on the browser

D. all of the above

21
_____5. What malware appears as an interesting software but when installed, allows
intruders to gain access on your files?

A. Email virus

B. Boot sector

C. Trojan horse

D. Worms

B. Identification

Directions: Read the following statements carefully and identify what is being
described. Write your answer on the space provided before each number

__________________1. An email that provides a warning about a virus, worm or


vvvvvvvvvvv some other disaster, and urges recipients to forward the
ccccccccc message.
__________________2. It is a type of malware that infects executable files with the
xxxxxxx intent to cause permanent damage or make them unusable.
__________________3. A type of malicious computer program that infects computer,
vvvvvvvvv it replicates by copying itself to another program without the
ccccccccccccccccc knowledge of the user.
__________________4. It is a fast-moving virus that uses file infectors or boot
cccccccc infectors to attack the boot sector and executable files
cccccccc simultaneously.
__________________5. A malicious code that copies and multiplies itself using
cccccccccc computer networks and security flaws.
__________________6. A helpful tool in preventing viruses from penetrating into your
VVVV computer.
__________________7. Any type of attack where the attackers (hackers) attempt to
VVVVVV prevent legitimate users from accessing the service.
__________________8. A file-infecting virus may also be known as a ____________.
__________________9. It is one of the well known and destructive example of worm
VVVV created by a Filipino college student.
__________________10. These viruses copy their infected code either to the floppy
VVVV disk's boot sector or to the hard disk's partition table.

22
Additional Activities

Let’s Organize!

Directions: Fill out the missing terms in the graphic organizer below. Write your answer on
the box provided.

Computer
Virus

Types Symptoms Prevention

23
24
What I Know What is it
A. Multiple Choice Guide Question 1 - (answers may vary)
1. C Guide Question 2 - (answers may vary)
2. C Guide Question 2 - (answers may vary)
3. D Guide Question 2 - (answers may vary)
4. D
What’s More
5. B
Independent Activity 1
B. True or False
Describe Me!
6. T
(answers may vary)
7. T
Possible Answers
8. F
1. Can be destructive
9. T
2. replicates by copying itself
10. F
3. Man-made
11. T 4. Used to steal information
5. Performs malicious action
12. F
Follow-up question (answers may vary)
13. F
Sample Answer
14. F A computer virus is man-made and can
replicate by copying itself. It performs malicious
15. T
action which can be destructive like stealing
What’s In information.
(From left to right)
Independent Assessment 1
User, Application, Operating system, Hardware
A. Multiple Choice
In simple terms it can be said that a/an op-
1. C
erating system is a piece of software that is need-
2. C
ed to run the applications on a computer or a mo-
bile device. The programs that run on an operating 3. C
system talk to the hardware. 4. B
5. A
What’s New (Word Hunt)
B. Fact of Bluff
V S T U W V W T Z X Y M I N R 1. F
H I X A O H D R R R L H O E S 2. B
G W C X R Z A O W H O F P H O
3. F
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U 4. F
E R A W L A M N Y R T R E W Q 5. B
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B
Answer Key
25
Independent Activity 2 Independent Activity 3
Picture Me Out Violators!
A. 1. Never download unrecognized files or
software. (explanations may vary)
A. 1. Unexpected computer behavior
2. Keep your antivirus software up to date.
2. Error messages (explanations may vary)
3. Slow processing and performnace 3. Hands-off with unfamiliar messages.
4. Hardware and accessory problems (explanations may vary)
5. Sudden freezes and crashes 4. Think before you click. (explanations may vary)
B. 5. Increase external security. (explanations may
1. Worms vary)
A malicious code that copies and multiplies Independent Assessment 3
itself using computer networks and security flaws.
2. Email Virus A. Modified True or False
An email virus is a virus that is sent with or 1. TRUE
attached to email communications. It spreads by 2. Do not open
automatically forwarding itself to thousands of peo-
ple. 3. TRUE
3. Trojan Horse 4. Not all
Trojan horse appears as an interesting soft- 5. TRUE
ware but when installed it allows intruders to gain
access on your files. B. Do’s or Don’ts
4. File Virus (File Infecting Virus) 1. Do
It is a type of malware that infects executa- 2. Don’t
ble files with the intent to cause permanent damage
or make them unusable. 3. Don’t
5. Hoax 4. Do
A virus hoax is an email that provides a 5. Don’t
warning about a virus, worm or some other What I Have Learned
disaster, and urges recipients to forward the What level are you?
message. (answers may vary)
Independent Assessment 2 What I Can Do
A. Matchy Matchy! Co-Virus
1. A (answers may vary)
2. G Assessment
3. C
A. Multiple Choice
4. D
5. B 1. D
2. D
B. You Complete Me!
3. D
1. 2400 Baud Modem Virus or Good Time Virus
4. B
2. Denial of Service
5. C
3. File Virus
4. Concept
5. Michaelangelo or Stoned
26
B. Identification
1. Hoax
2. File Virus
3. Computer Virus or Virus
4. Multipartite
5. Worms
6. Antivirus software
7. Denial of Service
8. File Infector
9. I love you virus or Love you Love bug
10. Boot Sector Virus
Additional Activities
Let’s Organize
Types
File Infector
Boot Sector
Multipartite
Macro
Denial of
Service
Hoax
Signs / Symptoms
Slow Processing and performance
Unexpected computer behavior
Sudden freezes and crashes
Error Messages
Missing or extra files
Hardware and accessory
Problems
Prevention
Think before you click
Hands-off with unfamiliar messages
Increase external security
Never download unrecognized files or software
Keep your antivirus software up to date
References

Bennett, Coleman & Co. Ltd. “Definition of 'Computer Virus'” The Economic Times.
Accessed June 30,2020, https://economictimes.indiatimes.com/definition/computer%
20virus
Technibble. “Why do People Create Computer Viruses?” Technibble. Accessed July 01,
2020, https://www.technibble.com/why-do-people-create-computer-viruses/?fbcli
d=IwAR3QcLI_5NiHdi_cC5-hO1_uAIiA15mDP_967bHAJdCU2jjYGH4rttgjKa8
Computer Hope. “Why do people create viruses and malware?” Computer Hope. Accessed
July 01, 2020, https://www.computerhope.com/issues/ch001404.htm?fbclid=IwAR1
Gv1Guq52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg
Benton, Bryan. “10 Tips on How to Prevent Malware From Infecting Your Computer—and
Your Livelihood.” Autodesk. Accessed July 03, 2020, https://www.autodesk.com/
redshift/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/?fbclid=IwA
R0678r0BVnb8N2Ay8w_yXRrwywt0lvJUqJH4TLzeotUjPbWJXgTwoj3Efk
Devtelx. “Know How To Avoid Computer Virus Attacks.” Telx. Accessed July 05,2020,
https://www.telxcomputers.com/avoid-computer-virus-attacks/?fbclid=IwAR1Gv1Guq
52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg
Spam Laws. “The Common Types of Computer Viruses.” SpamLaws. Accessed July
06,2020, https://www.spamlaws.com/virus-comtypes.html?fbclid=IwAR2NcnGuY-Lee
PpArocURgjAeK5e6K452JkIteDAmTeQ7KP6pzma-IBKQW0
Computer Hope. “Macro virus.” Computer Hope. Accessed July 06, 2020. https://
www.computerhope.com/jargon/m/mvirus.htm?fbclid=IwAR0ZJ3Uf0W3-X6ijqqaAPPjf
uWlOwAlslwfLqFrtKfESluH334X1JfuMeHg
SQA. “Internet Safety: Viruses.” Sqasolar. Accessed July 06,2020. https://
www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm?fbclid=IwAR1WQJho
o3Z9QDj9K5Ju75p-3PyrfpDqprAyZIohc_1WAJuLNS-sSnVomyI

27
For inquiries or feedback, please write or call:
Department of Education, Schools Division of Bulacan
Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph

You might also like