Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

lOMoARcPSD|22509211

Research Study Of Computer Viruses in Practical Research

Accounting Information System (Rizal Technological University)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Kim Cabalud (yunikim823@gmail.com)
lOMoARcPSD|22509211

Chapter I

THE PROBLEM AND ITS BACKGROUND

Introduction

From the past generations, people use books searching and gathering information for their academic

activities and also the way they communicate with one another is through letter. When new generations come,

technology arises that they are made to create computer which is more capable to perform an easy way of gathering

information where in just one click we can have the information we are looking for. The communication between

two people became much easier through social media. As time passes, technology innovates and create more

useful device like android phone which is more efficient and comfortable to handle and use anywhere. Computer

is created by Charles Babbage where its main use is for calculation.

The computer virus also born and it became a dangerous program in the world of technology where it has

the ability to destroy the program of a computer. It can replicate itself to spreads from other computer through

sharing infected files. Once the virus is installed on a computer, the virus modified or remove the application and

system files. Some computer viruses make the computer inoperable, others merely display starting screen message

to unsuspecting users. Virus is used by hackers to steal information, stalk someone, and control other devices.

Background of the Study

Computer virus is a malicious code or a program written to alter the way computer operates. It is like to

human virus where the virus is destroying the immune system of human while on the virus of the computer is

damaging the software and corrupting data. This computer virus is also a serious matter in our daily life, cause it

can harm us from many reason like for example, corrupting or deleting your important files also it slow the

performances of your computer where it consume a lot of time for our activities. Computer virus can also get and

spread your personal information that can destroy your memory. It has the ability to replicate itself so that it can

spread to other computer as much as where it can spread.

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Though some viruses do little but replicate, others can cause serious damage or affect programs and system

performance for the students. Computer viruses can steal your personal data or information without knowing it.

For instances, it will make yourself ill and overthink on how you get back and re-own your personal data.

Computer is increasingly used by our fellow students from different schools. The researchers observed

that some evidence of computer viruses could be harmful for the academic performance of students. Thus the

main potential concern of the conduct of this study is how to prevent computer viruses towards the academic

activities of ICT Students in Arellano University – Pasig.

Statement of the Problem

The purpose of this research is to discuss different types of computer viruses along with their

characteristics working effect on the computer systems. Suggest, measure for detecting the virus infection in the

computer system and to provide means of prevention.

This study will seek to provide answers to the following questions:

1.) What is the profile of respondent in terms of:

Age:

Gender:

Section:

2.) What is computer virus?

3.) How Computer Virus only related to Computers?

4.) How does computer virus work in the computer?

5.) What is the best way to prevent and stop the virus?

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Conceptual Framework
Table 1

INPUT PROCESS OUTPUT


To find out the
implications of
Data Gathering Computer virus that
The Statement through: may affect to the
of the Problem Computer activities
A. Questionnaires
B. Analysis and of Grade 12 ICT
Interpretation students in Arellano
of Data. University - Pasig

Figure 1: This conceptual framework illustrates a diagram that shows the Input, Process, and Output of the

Research Study.

Theoretical Framework
Presented by Xiaofan Yang, Bimal Kumar Mishra, Yanbing Liu Computer viruses are a large class of

malicious codes that can spread among computers and perform detrimental operations. This issue on theory,

model, and methods of computer virus aims to better understand the way computer viruses spread on the Internet

and thereby work out effective policies of defending against them. This issue contains 12 fascinating papers, with

a focus on epidemic modeling.

The majority of previous computer virus epidemic models neglect the notable difference between

computer viruses and infectious diseases. Noting that all infected computers have infectivity naturally, X. Yang

and L.-X. Yang suggest a series of novel epidemic models, known as the SLBS models. Toward this direction,

L.-X. Yang and X. Yang address a special SLBS model, declaring its global dynamics. By incorporating a

temporary immunity compartment in an SLBS model, M. Yang et al. derive a new model, known as the SLBRS

model, revealing its global behaviors.

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

In reality, virus spreading is influenced by multifarious factors. C. Gan et al. examine the effect of human

intervention on virus spreading, proclaiming the global properties of the proposed model. J. Ren et al. investigate

the influence of time-varying delay on virus spreading, obtaining similar theoretical results. In view of impulsive

vaccinations, C. Zhang et al. devise an impulsive epidemic model, arguing the existence of a globally attractive

periodic solution provided the vaccination rate is large enough. Noting the inevitable fluctuation of a system

parameter, C. Zhang et al. induce a stochastic epidemic model, announcing its global stability.

As autonomous computer viruses, worms and botnets turn out to be a great threat to information security.

By incorporating three additional compartments in the conventional SEIS model, Yao et al. propose a delayed

epidemic model of worms, showing that a Hopf bifurcation phenomenon might occur. L. Feng et al. raise a model

of peer-to-peer botnet and investigate its global dynamics from both the microlevel and the macrolevel.

Smart mobile terminals have come to be an integral part of the Internet. By a close inspection of the

features of both smart mobile terminals and human behaviors, Y. Liu et al. propose a practical virus detection

scheme.

The Internet turns out to possess scale-free property, with node degrees following a power-law

distribution. In this context, C.-Y. Huang and C.-T. Sun probe deeply the effect of available resources and costs

on the spread of computer viruses.

Hypothesis

Grade 12 ICT Student’s academic activities has implication on computer virus that slows the computer’s

performance, destroys important files and computer’s hardware.

Scope and Delimitation

Virus is a very dangerous program in the computer because it can affect the academic performances of a

student, in order to prevent it, the researchers will gather data from Arellano University, Pag-Asa St., Caniogan

Pasig City. The respondents will be the Grade 12 ICT students that will serve as the sources of the information on

how to prevent virus and what are the things that may happen to the students if they encounter a computer virus

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

also how virus is related to the computer. This study will only cover about virus and it’s work on the Computer

and how Computer Viruses affect students in their Computer Activities.

Significance of the Study

Typical computer users

They can work easily and faster without interruptions. They will be provided with solid knowledge about

the computer hardware when they want to solve a serious problem on their own.

ICT Students

They will be able to do work quickly and efficiently. They will save more time for other academic activities

and performance without troubleshooting.

Teachers –

They will be informed on how to deal with each kind of viruses and how they can avoid and be able to

stop it. Their important files such as students’ records will be safe from virus.

Definition of Terms

The information below helps the readers to fully understand the researcher papers from the researchers.

Academic Performance- Is the extent to which a student, teacher, or institution achieved their short or long term

educational goals.

Computer Hardware - Computer hardware includes the physical parts or components of a computer.

Computer Program- Is a collection of instructions for performing a specific task that is designed to solve a

specific class of problems.

Computer System - Is a basic, complete, and functional computer, including all the hardware and software

required to make it functional for user.

Computer Users - A person who utilizes a computer or network service. It is often has a user account and is

identified to the system by a username or password.


5

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Computer Virus- Much like a flu virus, is designed to spread from host to host and has the ability to replicate

itself.

Data Corruption - Errors in computer data that occur during writing, reading, storage, transmission or processing

which introduce unintended changes to the original data.

Interrupt - Stopping the continuous progress of an activity or process.

Software - The programs and other operating information used by a computer.

Troubleshoot- Solving a serious problem for a company or other organizations.

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

CHAPTER II

REVIEW OF RELATED LITERATURE

From the Researcher’s Gathered Information, Related Literature both Foreign and Local, The Researchers

found out the importance of computer which is demanded in the whole world also its benefits to the Computer

Users. This Related Literature also states the dangerous of Computer Viruses that made the public aware and deal

with it, where it also states the destruction of Computer Viruses in the whole World and the discovery of new

viruses that is highly dangerous than the previous virus. It also states the history of Computer Virus on how they

created by manpower.

Foreign Literature

According to Reuter, (June 27, 2017) observed that a new cyber virus spread from Ukraine to wreak havoc

around the globe on Wednesday, crippling thousands of computers, disrupting ports from Mumbai to Los Angeles

and halting production at a chocolate factory in Australia. The virus is believed to have first taken hold on Tuesday

in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited

a local news site, national police and international cyber experts said. More than a day after it first struck,

companies around the world were still wrestling with the fallout while cyber security experts scramble to find a

way to stem the spread. U.S. delivery firm FedEx Corp (FDX.N) said its TNT express division had been

significantly affected by the virus, which also wormed its way into South America, affecting ports in Argentina

operated by China’s Cofco. Demanded victims post a random worth $300 in bitcoins or lose their data entirely,

similar to the extortion tactic used in the Global WannaCryransomware attacked in May. More than 30 victims

paid up but security experts are questioning whether extortion was the goal, given the relatively small sum

demanded, or whether the hackers were driven by destructive motives rather than financial gain. Hackers asked

victims to notify them by email when ransoms had been paid but German email provider posteo quickly shutdown

the address, a German government cyber security official said. Ukraine, the epicenter of the cyber strike, has

repeatedly accused Russia or orchestrating attacks on its computer system and critical power infrastructure since

its powerful neighbor or annexed the Black Sea peninsula of Grimea in 2014.
7

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

As stated by Dutta, P., (March 31, 2015) by his work “Benefits of Computer in Society” observed that

ever since the first IBM PC was sold in 1981 in the bundling of microsoft’s windows operating system on

subsequent easy-to-use PC’s, computers have revolutionized the way individuals, students, and enterprises work,

communicate, live, educate, and entertain. Computers are now integral to virtually every possible human and non-

human activity the benefits of computers to society are manifold:

Works – Computers are now use in every domain field and sector and across industries. They are used for a

variety of task, application, and activities and to enhance productivity on all fronts.

Communication- the advent of the Internet and its proliferation have force-multiplied the usage of computers.

People all over the world are able to communicate, engage and interact with each other using IM, email, Blogs,

Online Forums, Social Media, and other options.

Job Influence- the widespread use and application of computers has created multiple industries derived sectors

and profession and facilitated job opportunities for millions of people.

Entertainment- High-end desktops and full-featured notebook PC’s have become all-in-one entertainment

systems for millions of users as they watch movies, sports, events and news program, shop, socialize, download

videos, and play games.

Education- computer have simplified and streamlined the process of education for millions of young teens,

college going students and post-graduates. The use of computers has democratized the influence, reach and

penetration of education and knowledge to students in far-flung and geographically remote regions.

In agreement with Judge (2018) Robert Thomas, an engineer at BBN Technologies developed the

first known Computer Virus in the year 1971. The first virus was christened as the “Creeper” virus, and the

experimental program carried out by Thomas infected mainframes on ARPANET. The teletype message displayed

on the screen read, “I’m the creeper: Catch me if you can.” But the original wild computer virus probably the first

one to be tracked down in the history of computer viruses was “Elk Cloner.” The Elk Cloner infected apple II

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

operating systems through floppy disks. The message displayed on Infected Apple Computer was a humorous

one. The virus was developed by Richard Skrenta, a teenager in the year 1982. Even though the computer viruses

were designed as a prank, it also enlightened how a malicious program could be installed in a computer’s memory

and stopped users from removing the program. It was Fred, who coined the terms “computer virus” and it was

after a year in 1983. The terms came into being when he attempted to write an academic paper titled “Computer

Viruses- Theory and Experiments” detailing about the malicious programs in his work.

Conforming to Overton, M. (2008) by his work “Malware Forensics detecting the unknown” observed

to looked at what tricks, tools and techniques one can use to help establish the true state of the suspect system.

Focused on step by step approach of what tools to use, what to look for & what to do with any suspicious files.

Based on WeebrootThink of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps

you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very

similar. Designed to replicate relentlessly, computer viruses infect your programs and files, alter the way your

computer operates or stop it from working altogether.

In 2013, the botnet virus GameoverZueS was discovered to use peer-to-peer downloading sites to

distribute ransomware and commit banking fraud. While tens of thousands of computer viruses still roam the

internet, they have diversified their methods and are now joined by a number of malware variants like

worms, Trojans, and ransomware.

How does a computer virus find me?

Even if you’re careful, you can pick up computer viruses through normal Web activities like:

1. Sharing music, files, or photos with other users

2. Visiting an infected website

3. Opening spam email or an email attachment

4. Downloading free games, toolbars, media players and other system utilities
9

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

5. Installing mainstream software applications without thoroughly reading license agreements

What does a computer virus do?

Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or

reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it

impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your

system’s performance, sapping computer memory and causing frequent computer crashes.

What are the symptoms of a computer virus?

Your computer may be infected if you recognize any of these malware symptoms:

1. Slow computer performance

2. Erratic computer behavior

3. Unexplained data loss

4. Frequent computer crashes

How to protect against computer viruses

When your arm yourself with information and resources, you’re wiser about computer security threats and less

vulnerable to threat tactics. Take these steps to safeguard your PC with the best computer virus protection:

1. Use antivirus protection and a firewall

2. Get antispyware software

3. Always keep your antivirus protection and antispyware software up-to-date

4. Update your operating system regularly

5. Increase your browser security settings

6. Avoid questionable Web sites

10

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

7. Only download software from sites you trust.

8. Carefully evaluate free software and file-sharing applications before downloading them.

9. Don't open messages from unknown senders

10. Immediately delete messages you suspect to be spam

An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in

and out of your computer and hide your PC from online scammers looking for easy targets. Products like Webroot

Internet Security Complete and Webroot Antivirus provide complete protection from the two most dangerous

threats on the Internet – spyware and computer viruses. They thwart threats before they can enter your computer,

stand guard at every possible entrance of your computer and fend off any computer virus that tries to open, even

the most damaging and devious strains.

While free antivirus downloads are available, they just can't offer the computer virus help you need to

keep up with the continuous onslaught of new strains. Previously undetected forms of polymorphic malware can

often do the most damage, so it’s critical to have up-to-the-minute, guaranteed antivirus protection.

Local Literature

According to Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer

Systems?” Examined that in every computer user, they use like software, installers, game application, and

accessories in computer systems. But some users irritate why their computers slows down, boot problems and

other unknown computer problems in Computer. It’s a “Computer Virus” also known as Malwares. A computer

virus is a type of malware that when executed replicates by inserting copies of itself into other computer programs,

data files, or the boot sector of the hard drive when this replication succeeds, the affected areas are then said to be

“Infected”. Viruses often perform some type of harmful activity on infected host, such as stealing hard disk space

or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the

user’s screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive

11

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

payload or attempt to hide themselves-the defining characteristic of viruses is that they are self-replicating

computer program which install themselves without the user’s consent. Through the course of using the Internet

and your computer, you may have come into contact with computer viruses. Many computer viruses are stopped

before they can start, but there is still an ever growing concern as to what to do computer viruses do and the list

of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your

email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses

are often spread by attachments in email messages or instant messaging messages. That is why it is essential that

you never open email attachment unless you know who it’s from and you are expecting it. Viruses can be disguised

as attachments of funny images, greeting cards, or audio and video files. It also spread through downloads on the

Internet in which they can hide in elicit software or other files or programs you might download. To help avoid

computer viruses, it’s essential that you keep your computer current with the latest updates and antivirus tools,

stay informed about recent threats, run your computer as a standard user, and that you follow a few basic rule

when you surf in the Internet, download files, and open attachments. Malware is a term that is used for malicious

software that is designed to do damage or unwanted actions to a computer system. Examples of Malware include

the following:

1. Viruses

2. Worms

3. Trojan horses

4. Spyware

5. Rogue security software

You may experience any of the following symptoms on your computer.

1. You notice that the computer is unusually slow, crashes, or stops responding frequently.

2. You cannot start your virus scanner or some system tools, including Task Manager.

12

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

3. You cannot open certain webpages. In a particular you cannot open security–related webpages such as the

Window Update Website.

4. You receive constant and unexpected pop-up windows.

These symptoms may indicate that your computer is infected with malware. However, the same problem

might also point to hardware or software issues that have nothing to do with Malware. Because it is difficult to

determine the reasons for your computer’s strange behavior, we suggested that you review the information in this

article to determine whether malware is causing the issue. Then, you can use the recommended tools and resources

to remove the malware.

As per Renson, R., D.,(2011) in his work “How Computer Viruses destructs the Computer Systems?”

Examined that the idea of having a computer in the home would have been met with sympathetic laughter. Within

the past ten years, computer science has advanced in great leaps, and made this dream a reality. No longer is the

computer considered an alien and inaccessible commodity. It has become such a standard household item that one

only has to look about the home to see its profound effect. We have become more and more reliant on this

newfound technology and power. With it has come a new vulnerability. A destructive force, once only speculated

about in science fiction books, has now become a painful reality. It has been dubbed the “Computer Virus”. Over

a short period of time, the threat has become so great that entire nation is forced to contend with it. Now all

computer users must learn how to protect themselves against it. As well, whole sciences have been developed to

study this new and highly dangerous technology. COMPUTER VIRUS: The Technology and Evolution of an

Artificial LifeForm is an expose written for everyone who owns or work with computers, detailing all aspects of

the computer virus, and similar technologies. Virus scanning, removal, and safeguarding are discussed at length,

along with comparison testing between several popular Anti-Virus software packages. Two branches of science

stemming from computer virus technology, synthetic psychology and artificial life, are considered in depth.

In agreement with Renson, R., D.,(2011) in his work “How Computer Viruses destructs the Computer

Systems?” Examined that in late 1992, the number of computer viruses was estimated from 1,000 to 2,300 viruses.

13

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

In 2002 there were 60,000 known viruses, Trojan, worms, and variations. Today there are well over 100,000

known computer viruses Studies and researches show that a computer connected to the internet may experience

an attack every 39 second. new vulnerabilities in the system are disconnected every few days. these vulnerabilities

are fixed by the software vendor who provide patches and update for the system. However, during this process

the vulnerabilities exploit by hackers, where malicious programs are installed on user machines to steal secret

data for financial gains. The compromised machines can also be made a part of a huge botnet that can be used to

launch denial of service attack on server, or be used in an attempt to intude the computers of government agencies.

Based on Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer Systems?”

Examined that Computer virus is a fascinating to many who are interested in nature, biology, or mathematics.

Everyone who uses a computer will likely encounter some form of the increasingly common problem of computer

viruses. In fact, some well-known computer virus researchers became interested in the field when, decade ago,

their own systems were infected. The title of Donald Knuth’s book series, The Art of Computer Programming,

suggests that anything we can explain to a computer is science, but that which we cannot currently explain to a

computer is an art. Computer virus research is a rich, complex, multifaceted subject. It is about reverse

engineering, developing detection, disinfection, and defense systems with optimized algorithms, so it naturally

has scientific aspects; however, many of the analytical methods are an art of their own. This is why outsiders often

find this relatively young field so hard to understand. Even after years of research and publications, many new

analytical techniques are in the category of art and can only be learned at antivirus and security vendor companies

or through the personal associations one must forge to succeed in this field. This book attempts to provide an

insider’s view of this fascinating research. In the process, “I hope to teach many facts that should interest both

students of the art and information technology professionals”. My goal is to provide an extended understanding

of both the attackers and the systems built to defend against virulent, malicious programs. Although there are

many books about computer viruses, only a few have been written by people experienced enough in computer

virus research to discuss the subject for a technically oriented audience. The following sections discuss historical

14

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

points in computation that are relevant to computer viruses and arrive a t a practical definition of the term computer

virus.

In accordance Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer

Systems?” Examined that fellow students swelled with pride at the drab little computer college where the 23-year-

old student, Onel de Guzman had outline something close to the rogue program in a thesis proposal. ‘it was

wrong,” conceded one of them, ‘but amazing!” After several days in hiding, Mr.de Guzman appeared at a

news conference, seeming overwhelmed by the extent of the destruction, and admitted that “it is Possible” that he

had unleashed the program that caused tens of millions of dollars of damage in more than 20 countries. Hiding

behind dark glasses and sometimes burying his face in his hands, Mr. de Guzman said that he had been fooling

around with fellows students in an informal club called GrammerSoft and had only wanted to create “a

gimmick”—a term used among young people here for an event that is exciting and fun. Asked what he felt about

the damage, he looked down and mumbled, “Nothing.” At one point, evading a question, he bent forward in his

seat and covered his ears with his hands. His Lawyer Rolando Quimbo, who often translated his mumbled answers

into full sentences, said the young man had come forward to demonstrate that he was not hiding from the law. He

added: “he is not really aware that the act imputed to him was done by him.” This befuddlement seemed telling

as this low-tech country find itself the epicenter of an international furor over crime in cyberspace. Because

computers play such a small role in the Philippines, it has never seen the need to write laws governing the internet.

It will take some legal creativity to prove that the creator of the program –a hybrid of varieties known as viruses

and worms – even committed a crime. For most students at schools like the AMA Computer College, where Mr.

de Guzman studies, computer literacy is a ticket to journeyman’s job overseas, following in a tradition that has

sent millions of Filipinos abroad to work as laborers, nurses and domestic helpers. For most other Filipinos, the

computer is still a source of futuristic amazement. Because of its low level of computerization, the Philippines

itself was not among the nations badly affected by the virus. This is a country of nearly 80 million people where

only 200,000 computers were sold last year. It is a country with one of the world’s high literacy rates, where only

5 percent of public school students have access to computers.

15

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

CHAPTER III

METHODOLOGIES AND PROCEDURES

This chapter presents the discussion of the methods of the researchers used. Describes the respondents of

the study, the sampling techniques that will be used, the researcher’s instrument in data gathering and the

procedure of data gathering.

Research Methodology

It is the specific procedures or techniques used to identify, select, process, and analyze information about

a topic.

The method will be used in this research is descriptive research and survey method. Where Descriptive

Research is used to describe the characteristics of a population or phenomenon being studied. It does not answer

questions about how/when/why the characteristics occurred. Rather it addresses the “what” question.

The characteristics used to describe the situation of a population are usually some kind of categorical scheme

also known as descriptive categories while survey methodology studies to the sampling of individual units from

a population and associated techniques of survey data collection such as questionnaire construction and methods

for improving the number and accuracy of responses to surveys. Survey methodology includes instruments or

procedures that ask one or more questions that may or may not be answered.

Subject of the Study

In this research study, 158 students in 3 different sections of Grade 12, the ICT2, ICT3, and ICT4 of ICT

Strand in Arellano University – Pasig will serve as researchers’ respondents for the research questionnaire.

The population of this study is 158 Grade 12 ICT students with a Sample size of 114 that get through the

formula which has come up from the Margin of Error. 38 students per section will be guided during the survey

and also the questionnaires will provide instructions and choices for the respondents to fully understand and

answer the questions.

16

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Sampling Techniques Used

According by Adi Bhat Simple random sampling is a sampling technique where every item in the

population has an even chance and likelihood of being selected in the sample. Here the selection of items

completely depends on chance or by probability and therefore this sampling technique is also sometimes known

as a method of chances.

This process and technique is known as simple random sampling, and should not be confused

with systematic random sampling. A simple random sample is a fair sampling technique.

Simple random sampling is a very basic type of sampling method and can easily be a component of a more

complex sampling method. The main attribute of this sampling method is that every sample has the same

probability of being chosen.

The sample size in this sampling method should ideally be more than a few hundred so that simple random

sampling can be applied in an appropriate manner. It is sometimes argued that this method is theoretically simple

to understand but difficult to practically implement. Working with large sample size isn’t an easy task and it can

sometimes be a challenge finding a realistic sampling frame.

The Researchers’ use Simple random sampling for the study about “A Study on the Implications of

Computer viruses to the Computer activities of Grade 12 ICT Students in Arellano University – Pasig School

Year 2018-2019 where this study focuses about computer virus so that we choose ICT Students which is more

efficient and knowledgeable to answer each and every questions that the Researchers made.

Research Instrument

The instrument used in this research is a guided response type survey questionnaire where it is base from

researchers’ statement of the problem that will be used for the respondent to get their answer in researchers’

research problem.

17

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Validation of Instrument

The survey questionnaire was validated by an English of Arellano University-Pasig Mr. Gerard S. Lavin.

To make sure that our questionnaire is formal and neat for gathering information for our research study.

Procedure of Data Gathering

The researchers’ sources of data will be from Grade 12 ICT Students who is well-knowledgeable about

computers and that can easily understand and answer the survey questionnaire. So that the respondents provide

the researchers an information about the connection of Computer virus to the Computer activities. The

Researchers will get 38 respondents from 3 sections which is Grade 12 ICT2, ICT3, and ICT4 to answer the

survey questionnaires. After this, the Researchers will analyze all the answers that the researchers gathered from

the ICT Students to make a conclusion in the problem of the study.\

Statistical Treatment of Data

The Statistical statement that the researcher will be using is the Data analysis where it used to find the
Standard deviation and the Mean of each answer in the questionnaire.

Sloven Formula

Population (N)= 158, Margin of Error (e)= 0.5 Sample size(n)=?

n= N 158 158 158

1+Ne2 1+(158)(0.5)2 1+(158)(0.0025) 1.395

n= 114

18

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

CHAPTER IV

PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA

Percentage of Gender

Female
32%

Male
68%

Figure 2: Shows the total number of male and female gathered from the respondents.

The total number of Male Grade 12 ICT respondents is 78 out of 114 the sample size with a percentage of

68%. The total number of Female Grade 12 ICT respondents is 36 out of 114 sample size with a percentage of

32%.

Total number of age of the respondents


17 y/o 18 y/o 19 y/o 20 y/o

4% 2%

41% 53%

Figure 3: Shows the percentage of age of the respondents from 17 to 20.

The total number of respondents age of 17 years old is 59 out of 114 the sample size with a percentage of

53%. The total number of respondents age of 18 years old is 45 out of 114 the sample size with a percentage of
19

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

41%. The total number of respondents age of 19 years old is 7 out of 114 the sample size with a percentage of

4%. The total number of respondents age of 20 years old is 5 out of 114 the sample size with a percentage of 2%.

Table 2
1. Computer virus is a malicious code created by a person.

Scale Frequency Range Interpretation

5 49 4.50-5.00 Excellent

4 38 3.50-4.49 Very Satisfactory

3 18 2.50-3.49 Satisfactory

2 6 1.50-2.49 Fair

1 3 1.00-1.49 Poor

Weighted Mean = 2.95

Standard Deviation = 3.76

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

49 out of 114 or 42.98% of ICT students are Strongly agree that Computer Virus is a Malicious code

created by a person. 38 out of 114 or 33.33% of ICT students are Agree that Computer Virus is a Malicious code

created by a person. Then the study Weighted Mean is 2.95 and it is interpreted as Satisfactory while the Standard

deviation is 3.76 and it is interpreted as Very satisfactory.

20

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 3
2. Computer virus may slow the performance of computer.

Scale Frequency Range Interpretation

5 57 4.50-5.00 Excellent

4 43 3.50-4.49 Very Satisfactory

3 11 2.50-3.49 Satisfactory

2 1 1.50-2.49 Fair

1 2 1.00-1.49 Poor

Weighted Mean = 3.13

Standard Deviation = 4.80

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

50% of Grade 12 ICT students are Strongly Agree that computer virus may slow the performance of the

computer. 37.72% of Grade 12 ICT students are Agree that computer virus may slow the performance of the

computer. Then the study Weighted mean is 3.13 and it is interpreted as Satisfactory while the Standard deviation

is 4.80 and interpreted as Excellent.

21

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 4
3. Computer virus can corrupt a file.

Scale Frequency Range Interpretation

5 58 4.50-5.00 Excellent

4 38 3.50-4.49 Very Satisfactory

3 15 2.50-3.49 Satisfactory

2 2 1.50-2.49 Fair

1 1 1.00-1.49 Poor

Weighted Mean = 3.11

Standard Deviation = 4.63

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

50.88% of Grade 12 ICT students are strongly agree that Computer virus can corrupt a files. 33.33% of

Grade 12 ICT students are Agree that Computer virus can corrupt a file. Then the Weighted mean is 3.11 and it

is interpreted as a Satisfactory while the Standard deviation is 4.63 and interpreted as an Excellent.

22

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 5
4. Computer virus can destroy a memory or hardware.

Scale Frequency Range Interpretation

5 54 4.50-5.00 Excellent

4 30 3.50-4.49 Very Satisfactory

3 22 2.50-3.49 Satisfactory

2 4 1.50-2.49 Fair

1 4 1.00-1.49 Poor

Weighted Mean = 2.96

Standard Deviation = 3.90

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

47.37% of Grade 12 ICT students are Strongly agree that Computer virus can destroy a memory or

hardware. 26.32% of Grade12 ICT students are Agree that Computer virus can destroy a memory or hardware.

Then the Weighted mean of this study is 2.96 and it is interpreted as a Satisfactory while the Standard deviation

is 3.90 and interpreted as Very satisfactory.

23

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 6
5. In order to prevent virus, install an Antivirus and make sure that it is always updated.

Scale Frequency Range Interpretation

5 51 4.50-5.00 Excellent

4 40 3.50-4.49 Very Satisfactory

3 19 2.50-3.49 Satisfactory

2 3 1.50-2.49 Fair

1 1 1.00-1.49 Poor

Weighted Mean = 3.03

Standard Deviation = 4.16

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

44.74% of Grade 12 ICT2 students are Strongly agree that in order to prevent virus, install an Antivirus and make

sure that it is always updated. 35.09% of Grade 12 ICT students are Agree that in order to prevent virus, install

an Antivirus and make sure that it is always updated. Then the Weighted mean of the study is 3.03 and interpreted

as Satisfactory while the Standard deviation is 4.16 and interpreted as Very satisfactory.

24

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 7
6. To avoid computer virus, do not try to visit unfamiliar websites.

Scale Frequency Range Interpretation

5 43 4.50-5.00 Excellent

4 51 3.50-4.49 Very Satisfactory

3 12 2.50-3.49 Satisfactory

2 5 1.50-2.49 Fair

1 3 1.00-1.49 Poor

Weighted Mean = 2.96

Standard Deviation = 4.22

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

37.72% of Grade 12 ICT students are Strongly Agree that in order to avoid Computer virus, do not try to

visit unfamiliar websites. 44.74% of Grade 12 ICT students are Agree that in order to avoid Computer virus, do

not try to visit unfamiliar websites. Then the Weighted mean of the Study is 2.96 and interpreted as Satisfactory

while the Standard deviation is 4.22 and interpreted as 4.22 and interpreted as Very satisfactory.

25

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Table 8
7. To make sure your computer is safe, be aware to the existence of the virus.

Scale Frequency Range Interpretation

5 54 4.50-5.00 Excellent

4 46 3.50-4.49 Very Satisfactory

3 11 2.50-3.49 Satisfactory

2 1 1.50-2.49 Fair

1 2 1.00-1.49 Poor

Weighted Mean = 3.11

Standard Deviation = 4.74

Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree

47.37% of Grade 12 ICT students are Strongly Agree that to make sure your computer is safe, be aware

about the existence of Computer virus. 40.35% of Grade 12 ICT students are Agree that in order to avoid

Computer virus, do not try to visit unfamiliar websites. Then the Weighted mean of the study is 3.11 and

interpreted as Satisfactory while the Standard deviation is 4.74 and interpreted as Excellent.

26

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

8. Are you aware to the existence of computer virus.

5%

YES
NO

95%

Figure 4: The awareness of Grade 12 ICT students to existence of computer virus

108 out of 114 or 95% of Grade 12 ICT students says Yes that they are aware to the existence of Computer

virus. 6 out of 114 or 5.26% of Grade 12 ICT students say No that they are aware to the existence of Computer

virus.

9. How often do you use computer for your computer activities

Grade 12 ICT

7%
Everday
28%
Every week
65% Every month

Figure 5: The percentage of the use of computer

27

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

74 out of 114 or 65% of Grade 12 ICT student use computer for their computer activities every day. 32

out of or 28% of Grade 12 ICT student use computer for their computer activities every week. 8 out of 114 or

7.02% of Grade 12 ICT student use computer for their computer activities every month.

10. How does computer virus affect your computer activities?

60

50
48
40 44

30

20
22

10

0
Grade 12 ICT Students

There is a possibility to delete my important files


It can corrupt my files
It delays my Computer Activities because of Computer's poor performance

Figure 6: Percentage of computer virus can affect computer.

44 out of 114 or 39% of Grade 12 ICT student says that there is a possibility to delete their important files

because of Computer virus. 48 out of 114 or 42% of Grade 12 ICT student says that it can corrupt files because

of Computer virus. 22 out of 114 or 19% of Grade12 ICT student says that it delays my computer activities

because of computer’s poor performance.

28

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

11. As an ICT student, how can you avoid computer virus

50
45
47
40
35 39
30
25 28
20
15
10
5
0
Grade 12 ICT Students

Avoid visiting unfamiliar websites Do not open suspicious attachment file


Activate your firewall antivirus

Figure 7: Percentage of ICT students can do to avoid computer virus.

39 out of 114 or 34% of Grade 12 ICT students says in order to avoid Computer virus avoid visiting

unfamiliar websites. 28 out of 114 or 25% of Grade 12 ICT students says in order to avoid Computer virus do not

open attachment file. 47 out of 114 or 41% of Grade 12 ICT students says in order to avoid Computer virus

activate your firewall antivirus.

12. If you encounter a computer virus, what are the solutions you can do to destroy the virus.

60

50 53

40

30 33
28
20

10

0
Grade 12 ICT students

Download an Antivirus Quickly format your Computer


Call a professional to fix your Computer

Figure 8: Percentage of solution can do to destroy computer virus

29

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

53 out of 114 or 46% of Grade 12 ICT student that the solution can do to destroy Computer virus is to

download an Antivirus. 28 out of 114 or 25% of Grade 12 ICT students that the solution can do to destroy

Computer virus is to Quickly format your computer. 33 out of 114 or 29% of Grade 12 ICT student that the

solution can do to destroy Computer virus is to call a professional to fix your computer.

30

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Chapter V

SUMMARY OF FINDS, CONCLUSIONS AND RECOMMENDATIONS

Summary of Findings

In this chapter stated the conclusion of the study in order to fulfill the purpose where is to prove the

connection of Computer virus to the Computer Activities. It also helps the readers and give them idea to the Virus

on how to interact on it. This research problem would not be solved without the help of Grade 12 ICT students

that answers our question through our questionnaire in which it contains the problem on the study. Using Simple

Random Sampling the researchers made to found the result to the research problem.

1. What is the profile of respondent in terms of :

Age:

Gender:

Section:

Based on the data that the researchers gather the total number of male respondents in Grade 12 ICT Strand

is 78 with a percent of 68.42%, while the total number of Female respondents in Grade 12 ICT Strand is 36 with

a percent of 31.58%.

Based on the data that the researcher gathered the total number of respondents with the age of 17 is 59

with a percent of 51.75%, while the total number of respondents with the age of 18 is 45 with a percent of 39.47,

while the other total number of respondents with the age of 19 is 4 with a percent of 3.51%, and the total number

of respondents with the age of 20 is 3 with a percent of 2.63%.

2.) What is computer virus?

Based on the data that the researchers gather Computer virus is a malicious code that created by person

where 49 out of 114 or 42.98% of ICT students are Strongly agree and 38 out of 114 or 33.33% of ICT students

are Agree that Computer Virus is a Malicious code created by a person.

31

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

3.) How Computer Virus only related to Computers?

Based on the data that the researchers gather Computer virus is related to computers because it also a program

like the program runs at the computer and that it may affect the Computer activities of ICT students that may

cause a lot of problem where 44 out of 114 or 39% of Grade 12 ICT student says that there is a possibility to

delete their important files because of Computer virus. 48 out of 114 or 42% of Grade 12 ICT student says that it

can corrupt files because of Computer virus. 22 out of 114 or 19% of Grade12 ICT student says that it delays my

computer activities because of computer’s poor performance.

4.) How does computer virus work in the computer?

Based on the data that the researchers gather Computer can do a lot of things in the Computer and by our

research through questionnaire answered by the ICT student where 87.72% said that Computer virus work is to

slow the performance of the Computer. 84.21% of Grade 12 ICT students said that Computer virus can corrupt

files. 53.69% said that Computer virus can destroy memory or hardware.

5.) What is the best way to prevent and stop the virus?

Based on the data gathered by the researchers that the best way to avoid Computer virus is that avoid

visiting unfamiliar websites where 82.46% of Grade 12 ICT students are agree and Strongly agree with this. And

that 87.72% said that ICT students should be aware to the existence of Computer virus so that Computer user be

aware to anything that It may happen to the computer where 95% of ICT students are aware to the virus. The best

way to stop the virus where 53 out of 114 or 46% of Grade 12 ICT student that the solution can do to destroy

Computer virus is to download an Antivirus. 28 out of 114 or 25% of Grade 12 ICT students that the solution can

do to destroy Computer virus is to Quickly format your computer. 33 out of 114 or 29% of Grade 12 ICT student

that the solution can do to destroy Computer virus is to call a professional to fix your computer.

32

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

APPENDICES

33

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

“EXPLORING THE STUDIES OF COMPUTER VIRUSES TO


THE ACADEMIC ACTIVITIES OF GRADE 12 ICT STUDENTS
IN ARELLANO UNIVERSITY – PASIG
SCHOOL YEAR 2019-2020”
Name (Optional): __________________________________ Gender: ________________
Age: _______________________ Section: ________________
DIRECTION: Put a check ( √ ) on the box of your chosen answer.
STRONGLY AGREE NEUTRAL DISAGREE STRONGLY
AGREE DISAGREE

1. Computer virus is a malicious code


created by a person.

2. Computer virus may slow the


performance of the computer.

3. Computer virus can corrupt files.

4. Computer virus can destroy a memory


or hardware.

5. In order to prevent virus, install an


antivirus and make sure that it is
always updated.

6. To avoid computer virus, do not try to


visit unfamiliar websites.

7. To make sure your computer is safe,


be aware about the existence of the
virus.

34

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

DIRECTIONS: Put a check ( √ ) on the box of your chosen answer.


1. Are you aware to the existence of computer virus?
Yes
No

2. How often do you use computer for your computer activities?


Everyday
Every week
Every month
3. How does computer virus affect your computer activities?
 There is a possibility to delete my important files.
 It can corrupt my files.
 It delays my computer activities because of computer’s poor performance

4. As an ICT Student, how can you avoid computer virus?


 Avoid visiting unfamiliar websites
 Do not open suspicious attachment file
 Activate your firewall antivirus

5. If you encounter a computer virus, what are the solutions you can do to destroy the virus?
 Download an antivirus
 Quickly format your computer
 Call a professional to fix your computer

35

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Conclusion

Therefore, we conclude that Computer activities has really an implication through Computer virus, in

where we discovered that computer virus is also a program that can be run through computer and works to destroy

the system of computer because Computer is a program that can control and manipulate Computers where the

Virus main purpose is to destroy the hardware of the Computer and slowly destroy computer. We found out that

the widely spread of Computer virus is that because it can replicate itself and attach to any file and spread through

by downloading or transferring files. We also found out that Computer virus is a dangerous program that can

destroy into anything technological type to change its function and construction of a system. Also discover that

these Computer viruses may affect the student in every time the student use computer to do some activities and

work where it can slow the performance of computer and it result to student no to finish their works. To our study

we also discover that the best way to prevent computer virus is make sure that you activate the firewall in the

computer and installed an antivirus.

36

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Recommendation

We are recommending this research for the computer users, the ICT students that they may able to do the

work quickly and efficiently and save a lot of time to proceed with other academic activities and performance

without troubleshooting. Typical computer users that can do the work quickly without interruption and also they

will be provided solid knowledge on how to deal on Computer viruses and why it is in Computer. And also the

teachers who often use computer and laptops for their record sheets. This research studies can be a source of

information how computer virus can get and what are the ways to avoid it. This study helps the ICT students to

freely transfer files from the computer on school without encountering Computer virus.

37

Downloaded by Kim Cabalud (yunikim823@gmail.com)


lOMoARcPSD|22509211

Bibliography

Topic Link/Source

“How Computer Viruses destructs the https://ronnierensonreal.weebly.com/.


Computer Systems?”
New Computer virus https://www.reuters.com/article/us-cyber-
attack/new-computer-virus-spreads-from-
ukraine-to-disrupt-world-business-
idUSKBN19I1TD
Conforming to Overton, M. (2008) by ovetonm@uk.ibm.com
his work “Malware Forensics detecting the
unknown”
Computer virus related to Computer https://www.webroot.com/us/en/resources/tips-
articles/computer-security-threats-computer-
viruses
What is virus? https: //antivirus.comodo.com/blog/computer-
safety/ what-is-virus-and-its-definition/
“Benefits of Computer in Society” https://www.techwalla.com/articles/what-are-
the-benefits-of-computers-in-society

38

Downloaded by Kim Cabalud (yunikim823@gmail.com)

You might also like