Professional Documents
Culture Documents
Ste Cs1q1m6 Smnhs
Ste Cs1q1m6 Smnhs
Computer Science I
Quarter 1 - Module 6
Computer Viruses
Computer Science I– Grade 7
Alternative Delivery Mode
Quarter 1 - Module 6 : Computer Viruses
First Edition, 2020
This module was collaboratively designed, developed and reviewed by educators from
public institutions to assist you, the teacher or facilitator, in helping the learners meet the
standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire
the needed 21st century skills while taking into consideration their needs and
circumstances.
In addition to the material in the main text, you will also see this box in the body of the
module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own
learning. Furthermore, you are expected to encourage and assist the learners as they do
the tasks included in the module.
1
This is a brief drill or review to help you link the
What’s In
current lesson with the previous one.
2
What I Need to Know
This module encourages you to be knowledgeable about the prevention of viruses and
other malicious code that affect computers. Various activities are provided for
you to perform to strengthen your knowledge and skills regarding the topic.
What I Know
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space provided.
_____1. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?
A. Malware C. Virus
B. Trojan Horse D. Worms
_____2. Which of the following is NOT a reason why people create viruses?
3
_____5. When was the term “computer virus” first defined?
A. 1943 C. 1999
B. 1983 D. 2001
B. True or False
Directions: Write T if the statement is true and F if the statement is false. Write your
answer on the space provided before each number.
_____6. File virus is also known as file injector.
_____9. Keeping your antivirus software up to date is one way of preventing malwares.
_____10. All viruses can cause your computer to suddenly freeze and crash.
_____11. Some people create virus to steal confidential information.
_____14. A worm is a virus sent with or attached to email communication and spreads by
automatically forwarding itself to thousands of people.
What’s In
Directions: Arrange the jumbled letters in the diagram below and describe how an
operating system works by completing the paragraph . Write your answer on
the space provided.
GOREAITNP
SURE CATPPAIONLI MTYESS DAWARRHE
_____________ _____________ ____________ _____________
_____________
4
What’s New
SEARCHING...
Word Hunt
Directions: Search and list down 10 words/phrases associated with computer viruses from
the box below. Words appear straight across, backward straight across, up and
down, down and up, and diagonally. Write your answer on the blank provided.
V S T U W V W T Z X Y M I N R
H I X A O H D R R R L H O E S
G W C X R Z A O W H O F P H O
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U
E R A W L A M N Y R T R E W Q
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B
1. _________________________ 6. __________________________
2. _________________________ 7. __________________________
3. _________________________ 8. __________________________
4. _________________________ 9. __________________________
5
What is It
Computer Viruses
We are now living in the so-called millennial era where technology is widely used.
Computers, laptops, and smartphones no longer impose a status symbol; it has become a
necessity. Cars today are safer and more efficient, thanks to ECU or electronic control
unit. Supplies of food and drugs were distributed to different supermarkets and
pharmacies every day to meet the demands, thanks to the good computerized inventory
system. But, as technology advances, we also encounter a new type of threat: computer
viruses.
ALERT!!!
VIRUS HAS BEEN DETECTED!
THINK!
Why do you think people create computer viruses? List down at least 2 reasons
_____________________________________________________________
_____________________________________________________________
C:\STARTING INVESTIGATION...
6
Let us check if your answers are correct.
3. To inconvenience others
Some malwares are created to cause trouble and inconvenience to people and
companies because it is entertaining and enjoyable to the people who created the
malware. The network system of banks and other institutions can crash due to the effect of
such malware.
Did you Know?
Cybercrime offenses such as hacking, computer fraud, spam, and libel
are punishable by Philippine Law as stated in the Republic Act No. 10175.
C:\LEVEL 1 COMPLETE
Aha! So those are their reasons. Okay detectives, let’s continue digging.
How do we know that our computers are being attacked by viruses?
_____________________________________________________________
_____________________________________________________________
C:\STARTING INVESTIGATION...
7
Let us check if your answers are correct.
4. Error messages
You should watch out for sudden appearance of
unexpected pop-up windows. Computers know something is
wrong before we even notice it. Sudden appearance of pop-up
messages warning you about missing application files or
system is one of the symptoms your computer is infected.
8
C:\_ Command Prompt
C:\Users\LittleDetectives>
C:\LEVEL 2 COMPLETE
__________________________________________________________________
__________________________________________________________________
C:\STARTING INVESTIGATION...
1. Trojan Horse
2. Worms
3. Email Virus
9
Types of Computer Viruses
It is a type of malware that infects executable files with the intent to cause permanent
damage or make them unusable. A file-infecting virus overwrites code or inserts infected
code into an executable file. This type of virus can infect several operating systems. A
file-infecting virus may also be known as a file injector. Examples of this type of virus are
Jerusalem and Cascade.
A boot sector virus is a computer virus that infects a storage device's master boot
record (MBR). This virus copies its infected code either to the floppy disk's boot sector or
to the hard disk's partition table. The propagation of boot sector viruses has become very
rare since the decline of floppy disks. Also, present-day operating systems include
boot-sector safeguards that make it difficult for boot sector viruses to infect them.
Michaelangelo and Stoned are examples of this type of virus.
3. Multipartite Virus
A multipartite virus is also known as a hybrid virus. It is a fast-moving virus that uses
file infectors or boot infectors to attack the boot sector and executable files simultaneously.
Most viruses either affect the boot sector, the system or the program files. The multipartite
virus can affect both the boot sector and the program files at the same time, thus causing
more damage than any other kind of virus. A multipartite virus infects computer systems
multiple times and at different times. In order for it to be eradicated, the entire virus must
be removed from the system. Examples of this type of virus are Anthrax and Tequila.
4. Macro Virus
A macro virus is a computer virus that replaces a macro, which enables a program
to work and activates a designated group of actions and commands. When these actions
and commands are replaced by a virus, this can cause significant harm to a computer.
Macro viruses may be spread through email attachments, modems and on the internet,
networks, and disks. Concept is first known example of macro virus.
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt
to prevent legitimate users from accessing the service. In a DoS attack, the attacker
usually sends excessive messages asking the network or server to authenticate requests
that have invalid return addresses. In simple terms, this attacks functions by flooding
cccc c
10
targeted computers with requests, until it can no longer be processed leading to denial of
service. Examples of this type of virus are Ping of Death Attack and Teardrop Attack.
6. Hoax
A virus hoax is an email that provides a warning about a virus, worm, or some other
disaster, and forces recipients to forward the message. Hoax emails are often sent from
what appears to be a reliable source, which can make determining whether to heed their
message difficult for recipients. Although such hoaxes are usually benign, they suggest
that recipients delete important files from their computers or download an infected
attachment. 2400 Baud Modem Virus and Good Time Virus are some of the examples of
this type of virus.
C:\Users\LittleDetectives>
C:\LEVEL 3 COMPLETE
C:\STARTING INVESTIGATION...
11
3. Increase external security
Do not let other people use your computer without your permission. Though we
know that sharing is caring when it comes to a computer you might want to think twice. Not
all people are knowledgeable on the prevention of computer viruses, so sharing your
computer with others might cause you big damage like corruption of your data or worst, a
total system failure.
C:\Users\LittleDetectives>
C:\LEVEL 4 COMPLETE
C:\INVESTIGATION COMPLETED
C:\VIRUSES ELIMINATED
HOORAY! Good Job detectives. You are now ready for the
next phase. Time to check your understanding.
12
What’s More
Independent Activity 1
Describe Me!
Directions: Complete the concept map below by describing a computer virus. Write your
answer on the space provided.
___________________
___________________
___________________
___________________
COMPUTER
VIRUS
___________________
___________________
___________________
___________________
___________________
___________________
Based on your descriptions above, how will you define a computer virus?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
13
Independent Assessment 1
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answers on the space
provided before each number.
B. Fact or Bluff
Directions: Write F if the statement is a fact and B if the statement is a bluff.
_____1. All viruses are malwares but not all malwares are viruses.
_____2. Computer virus was first defined in 1993.
_____3. Some people create viruses to earn money.
_____4. Enjoyment and enthusiasm are some of the reasons why people create malicious
codes.
_____5. Programs that secretly acquire personal information and account details is helpful
to your computer.
14
Independent Activity 2
Picture Me Out!
A. Directions: Analyze the pictures shown below and identify the different virus symptoms
present. Write your answer on the space provided.
1. __________________ 2. __________________
4. __________________
3. __________________ 5. __________________
B. Directions: Identify and describe the following examples of computer viruses based on
the given illustrations. Write your answer on the space provided.
1.______________________ -
______________________________________________
______________________________________________
2.______________________ -
______________________________________________
______________________________________________
3.______________________ -
_____________________________________________
_____________________________________________
4.______________________ -
_____________________________________________
_____________________________________________
5.______________________ -
_____________________________________________
_____________________________________________
15
Independent Assessment 2
A. Matchy - Matchy!
Directions: Match Column A to Column B. Write the letter of your answer on the space
provided.
COLUMN A COLUMN B
1 Hoax
2 Teardrop Attack
3 Jerusalem
4 Macro
5 Boot Sector
16
Independent Activity 3
Violators!
Directions: Analyze the given situations below and identify which among the tips in
preventing computer viruses has not been followed and give a short
explanation of your answer. Write your answer on the blank provided.
Situation 1
Amanda bought a personal computer for her son. Her son, Anton, is very fond
of computer games so he looked for free software on the web for his favorite
basketball game.
Answer: _________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Situation 2
Amelia is currently writing her thesis for her graduate studies. She is afraid of
losing her files so she installed three antivirus software to increase her computers
protection.
Answer: _________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Situation 3
Mike has been receiving several emails from his friends with the same
attachments . Out of his curiosity, he decided to open one of the messages.
Answer: _________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Situation 4
While browsing on the web, Mars saw a pop-up indicating that he won a raffle
m
17
draw. Due to his excitement he immediately clicked the said pop-up.
Answer: _________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Situation 5
Claire leaves her laptop unattended and allows her friends to use it whenever
they need it.
Answer: _________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Independent Assessment 3
A. Modified True or False
Directions: Write TRUE if the statement is correct. In case it is false, CHANGE the
underlined word or phrase to make the statement correct. Write your answer
on the space provided.
_________________1. Be cautious when you access unfamiliar sites and as a rule if you
don’t know it don’t click it..
_________________5. Music, videos and pictures from untrusted sources may also
nnnnnn contain malware.
B. Do’s or Don’ts
Directions: Write DO if the action helps protect your computer and DON’T if the action
can harm your computer. Write your answer on the space provided.
___________3. Download music, movies and games from any internet website.
18
___________4. Allow other people to use your computer with your supervision.
Directions: Using the given rubrics below, try to assess the level of your
understanding regarding the different topics presented in this module.
Encircle the level of understanding in which you feel you are into.
Level of Un-
Scale Description
derstanding
19
Topics in the module Scale
What I Can Do
Co-Virus
Directions: We are currently facing a pandemic due to a virus called “Corona”, using
a Venn diagram, show the similarities and differences of computer virus
and corona virus.
Computer Corona
Virus
Virus
20
Assessment
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space
provided before each number.
A. destructive
B. destroys data
______3. Which among the following is a sign that your computer might be infected by
a virus?
______4. How can you prevent a computer virus from entering your computer?
21
_____5. What malware appears as an interesting software but when installed, allows
intruders to gain access on your files?
A. Email virus
B. Boot sector
C. Trojan horse
D. Worms
B. Identification
Directions: Read the following statements carefully and identify what is being
described. Write your answer on the space provided before each number
22
Additional Activities
Let’s Organize!
Directions: Fill out the missing terms in the graphic organizer below. Write your answer on
the box provided.
Computer
Virus
23
24
What I Know What is it
A. Multiple Choice Guide Question 1 - (answers may vary)
1. C Guide Question 2 - (answers may vary)
2. C Guide Question 2 - (answers may vary)
3. D Guide Question 2 - (answers may vary)
4. D
What’s More
5. B
Independent Activity 1
B. True or False
Describe Me!
6. T
(answers may vary)
7. T
Possible Answers
8. F
1. Can be destructive
9. T
2. replicates by copying itself
10. F
3. Man-made
11. T 4. Used to steal information
5. Performs malicious action
12. F
Follow-up question (answers may vary)
13. F
Sample Answer
14. F A computer virus is man-made and can
replicate by copying itself. It performs malicious
15. T
action which can be destructive like stealing
What’s In information.
(From left to right)
Independent Assessment 1
User, Application, Operating system, Hardware
A. Multiple Choice
In simple terms it can be said that a/an op-
1. C
erating system is a piece of software that is need-
2. C
ed to run the applications on a computer or a mo-
bile device. The programs that run on an operating 3. C
system talk to the hardware. 4. B
5. A
What’s New (Word Hunt)
B. Fact of Bluff
V S T U W V W T Z X Y M I N R 1. F
H I X A O H D R R R L H O E S 2. B
G W C X R Z A O W H O F P H O
3. F
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U 4. F
E R A W L A M N Y R T R E W Q 5. B
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B
Answer Key
25
Independent Activity 2 Independent Activity 3
Picture Me Out Violators!
A. 1. Never download unrecognized files or
software. (explanations may vary)
A. 1. Unexpected computer behavior
2. Keep your antivirus software up to date.
2. Error messages (explanations may vary)
3. Slow processing and performnace 3. Hands-off with unfamiliar messages.
4. Hardware and accessory problems (explanations may vary)
5. Sudden freezes and crashes 4. Think before you click. (explanations may vary)
B. 5. Increase external security. (explanations may
1. Worms vary)
A malicious code that copies and multiplies Independent Assessment 3
itself using computer networks and security flaws.
2. Email Virus A. Modified True or False
An email virus is a virus that is sent with or 1. TRUE
attached to email communications. It spreads by 2. Do not open
automatically forwarding itself to thousands of peo-
ple. 3. TRUE
3. Trojan Horse 4. Not all
Trojan horse appears as an interesting soft- 5. TRUE
ware but when installed it allows intruders to gain
access on your files. B. Do’s or Don’ts
4. File Virus (File Infecting Virus) 1. Do
It is a type of malware that infects executa- 2. Don’t
ble files with the intent to cause permanent damage
or make them unusable. 3. Don’t
5. Hoax 4. Do
A virus hoax is an email that provides a 5. Don’t
warning about a virus, worm or some other What I Have Learned
disaster, and urges recipients to forward the What level are you?
message. (answers may vary)
Independent Assessment 2 What I Can Do
A. Matchy Matchy! Co-Virus
1. A (answers may vary)
2. G Assessment
3. C
A. Multiple Choice
4. D
5. B 1. D
2. D
B. You Complete Me!
3. D
1. 2400 Baud Modem Virus or Good Time Virus
4. B
2. Denial of Service
5. C
3. File Virus
4. Concept
5. Michaelangelo or Stoned
26
B. Identification
1. Hoax
2. File Virus
3. Computer Virus or Virus
4. Multipartite
5. Worms
6. Antivirus software
7. Denial of Service
8. File Infector
9. I love you virus or Love you Love bug
10. Boot Sector Virus
Additional Activities
Let’s Organize
Types
File Infector
Boot Sector
Multipartite
Macro
Denial of
Service
Hoax
Signs / Symptoms
Slow Processing and performance
Unexpected computer behavior
Sudden freezes and crashes
Error Messages
Missing or extra files
Hardware and accessory
Problems
Prevention
Think before you click
Hands-off with unfamiliar messages
Increase external security
Never download unrecognized files or software
Keep your antivirus software up to date
References
Bennett, Coleman & Co. Ltd. “Definition of 'Computer Virus'” The Economic Times.
Accessed June 30,2020, https://economictimes.indiatimes.com/definition/computer%
20virus
Technibble. “Why do People Create Computer Viruses?” Technibble. Accessed July 01,
2020, https://www.technibble.com/why-do-people-create-computer-viruses/?fbcli
d=IwAR3QcLI_5NiHdi_cC5-hO1_uAIiA15mDP_967bHAJdCU2jjYGH4rttgjKa8
Computer Hope. “Why do people create viruses and malware?” Computer Hope. Accessed
July 01, 2020, https://www.computerhope.com/issues/ch001404.htm?fbclid=IwAR1
Gv1Guq52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg
Benton, Bryan. “10 Tips on How to Prevent Malware From Infecting Your Computer—and
Your Livelihood.” Autodesk. Accessed July 03, 2020, https://www.autodesk.com/
redshift/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/?fbclid=IwA
R0678r0BVnb8N2Ay8w_yXRrwywt0lvJUqJH4TLzeotUjPbWJXgTwoj3Efk
Devtelx. “Know How To Avoid Computer Virus Attacks.” Telx. Accessed July 05,2020,
https://www.telxcomputers.com/avoid-computer-virus-attacks/?fbclid=IwAR1Gv1Guq
52yCXtfmo2twW8LAvfH2zsY2AU1tP2BOFl5xhT322FXbQ__ysg
Spam Laws. “The Common Types of Computer Viruses.” SpamLaws. Accessed July
06,2020, https://www.spamlaws.com/virus-comtypes.html?fbclid=IwAR2NcnGuY-Lee
PpArocURgjAeK5e6K452JkIteDAmTeQ7KP6pzma-IBKQW0
Computer Hope. “Macro virus.” Computer Hope. Accessed July 06, 2020. https://
www.computerhope.com/jargon/m/mvirus.htm?fbclid=IwAR0ZJ3Uf0W3-X6ijqqaAPPjf
uWlOwAlslwfLqFrtKfESluH334X1JfuMeHg
SQA. “Internet Safety: Viruses.” Sqasolar. Accessed July 06,2020. https://
www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm?fbclid=IwAR1WQJho
o3Z9QDj9K5Ju75p-3PyrfpDqprAyZIohc_1WAJuLNS-sSnVomyI
27
For inquiries or feedback, please write or call:
Department of Education, Schools Division of Bulacan
Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph