Ste Cs1q1m6 Smnhs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

7

Computer Science I
Quarter 1 - Module 6
Computer Viruses
Computer Science I– Grade 7
Alternative Delivery Mode
Quarter 1 - Module 6 : Computer Viruses
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist
in any work of the Government of the Philippines. However, prior approval of
the government agency or office wherein the work is created shall be necessary
for exploitation of such work for profit. Such agency or office may, among other
things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission to
use these materials from their respective copyright owners. The publisher and
authors do not represent nor claim ownership over them.

Published by the Department of Education - Region III


Secretary : Leonor M. Briones
Undersecretary : Diosdado M. San Antonio

Development Team of the Module

Author: Carla Jean P. Pangilinan


Language Reviewer: Evelyn I. Domalaon
Content Editor: Marciano V. Cruz, Jr.
Brenda ‘Lea A. Caranto, PhD
Illustrator: Maurice Dean P. Pangilinan
Layout Artist: Carla Jean P. Pangilinan

Management Team
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Rainelda M. Blanco, PhD
Education Program Supervisor - LRMDS
Agnes R. Bernardo, PhD
EPS-Division ADM Coordinator
Marinella P. Garcia Sy, PhD
EPS – Science
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS) Capitol
Compound, Guinhawa St., City of Malolos, Bulacan
Email address: [email protected]
7
Computer Science I
Quarter 1 - Module 6
Computer Viruses
Introductory Message

For the facilitator:


Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on
Computer Viruses.

This module was collaboratively designed, developed and reviewed by educators from public
institutions to assist you, the teacher or facilitator, in helping the learners meet the standards set by
the K to 12 Curriculum while overcoming their personal, social, and economic constraints in
schooling.

This learning resource hopes to engage the learners into guided and independent learning activities
at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st
century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use this module. You also need to
keep track of the learners’ progress while allowing them to manage their own learning. Furthermore,
you are expected to encourage and assist the learners as they do the tasks included in the module.

For the learner:


Welcome to Computer Science I STE 7 Alternative Delivery Mode (ADM) Module on
Computer Viruses!
This module was designed to provide you with fun and meaningful opportunities for guided and
independent learning at your own pace and time. You will be enabled to process the contents of the
learning resource while being an active learner.
This module has the following parts and corresponding icons:

This will give you an idea of the skills or competencies


you are expected to learn in the module.
What I Need to Know
This part includes an activity that aims to check what
you already know about the lesson to take. If you get all
What I Know
the answers correct (100%), you may decide to skip this
module.

1
This is a brief drill or review to help you link the
current lesson with the previous one.
What’s In
In this portion, the new lesson will be introduced to you
in various ways; a story, a song, a poem, a problem
What’s New opener, an activity or a situation.
This section provides a brief discussion of the lesson.
This aims to help you discover and understand new
What is It concepts and skills.
This comprises activities for independent practice to
solidify your understanding and skills of the topic. You
may check the answers to the exercises using the Answer
What’s More
Key at the end of the module.
This includes questions or blank sentence/ paragraph to
be filled in to process what you learned from the lesson.
What I Have Learned
This section provides an activity which will help you
transfer your new knowledge or skill into real life
What I Can Do situations or concerns.

This is a task which aims to evaluate your level of


mastery in achieving the learning competency.
Assessment

In this portion, another activity will be given to you to


enrich your knowledge or skill of the lesson learned.
Additional Activities

This contains answers to all activities in the module.


Answer Key
At the end of this module you will also find:
References - This is a list of all sources used in developing this module. The
following are some reminders in using this module:
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!

2
What I Need to Know

This module encourages you to be knowledgeable about the prevention of viruses and
other malicious code that affect computers. Various activities are provided for you
to perform to strengthen your knowledge and skills regarding the topic.

At the end of this module, you are expected to:


describe a computer virus;
state the reasons why people create computer virus;
identify some virus symptoms;
differentiate the various types of computer viruses; and
prevent malicious code attacks.

What I Know

A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space provided.

1. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?

A. Malware C. Virus
B. Trojan Horse D. Worms
2. Which of the following is NOT a reason why people create viruses?

A. to steal information C. to strengthen security


B. to make lots of money D. to inconvenience others
3. What type of virus can infect both boot sector and program files at the same time?
A. Email C. Macro
B. File D. Multipartite
4. What does a computer virus do?
A. deletes data C. damages hardware
B. damage program D. all of the above

3
5. When was the term “computer virus” first defined?

A. 1943 C. 1999
B. 1983 D. 2001

B. True or False

Directions: Write T if the statement is true and F if the statement is false. Write your answer
on the space provided before each number.
6. File virus is also known as file injector.

7. I Love You virus was created by a college Filipino student.

8. Install multiple antivirus software to enhance your computers’ protection.

9. Keeping your antivirus software up to date is one way of preventing malwares.

10. All viruses can cause your computer to suddenly freeze and crash.
11. Some people create virus to steal confidential information.

12. Macro virus is also known as hybrid virus.

13. Operating system software is a helpful tool in preventing viruses from penetrating
into your computer.
14. A worm is a virus sent with or attached to email communication and spreads by
automatically forwarding itself to thousands of people.
15. Regular scanning of your computer is helpful in preventing viruses from penetrating
your system.

What’s In

Directions: Arrange the jumbled letters in the diagram below and describe how an operating system
works by completing the paragraph . Write your answer on the space provided.

GOREAITNP
CATPPAIONLI MTYESS
SURE DAWARRHE

In simple terms it can be said that a/an is a piece of


software that is needed to run the on a computer or a mobile
device. The programs that run on an operating system talk to the
.

4
What’s New

Time to search for viruses!

SEARCHING...

Word Hunt
Directions: Search and list down 10 words/phrases associated with computer viruses from the box
below. Words appear straight across, backward straight across, up and down, down and
up, and diagonally. Write your answer on the blank provided.

V S T U W V W T Z X Y M I N R
H I X A O H D R R R L H O E S
G W C X R Z A O W H O F P H O
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U
E R A W L A M N Y R T R E W Q
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.

Notes to the Teacher

The activities in this module are designed to help learners to gradually master the desired
competency. In order for him/her to perform the desired tasks and achieve the desired
outcomes you need to give the support and guidance he/she needed.

5
What is It

Computer Viruses
We are now living in the so-called millennial era where technology is widely used.
Computers, laptops, and smartphones no longer impose a status symbol; it has become a necessity.
Cars today are safer and more efficient, thanks to ECU or electronic control unit. Supplies of food
and drugs were distributed to different supermarkets and pharmacies every day to meet the
demands, thanks to the good computerized inventory system. But, as technology advances, we also
encounter a new type of threat: computer viruses.

ALERT!!!
VIRUS HAS BEEN DETECTED!

A computer virus is a type of malicious computer program that infects a computer, it


replicates by copying itself to another program without the knowledge of the user. It doesn’t occur
naturally and is always brought by people. As soon as a computer virus is out, its transmission will
no longer be controllable. It can insert itself to a program or file, copy itself, and harm the
computer in the process. Not all viruses are destructive though, however, most of them perform
wrongful actions that can sometimes destroy data on your computer. Computer virus was first
defined in 1983 by Fred Cohen, a computer scientist who invented most of the widely used
computer virus defense techniques.

C:\_ Command Prompt


C:\Users\LittleDetectives>

Little detectives let us start our investigation.

THINK!

Why do you think people create computer viruses? List down at least 2 reasons

C:\STARTING INVESTIGATION...

6
Let us check if your answers are correct.

There are millions of computer viruses out there. Computer


programmers, hackers, and other computer techies have various reasons
in creating malicious codes. But why do people create such?
1. To earn money.
Many viruses don’t really do harm at all times aside from slowing down computers. Some
people create viruses to get information about the user, this information will then be sent to a person
or company for them to create the malware. Afterwards, information were used to send
advertisements to your computer. Advertisements come in different forms, it may be through an
email or a pop-up.

Oftentimes, different types of infections were concealed as free antivirus software. When
executed it will scan your computer and will show some viruses were found. And to remove those,
you’ll be asked to download the software and pay for the pro or premium version of the application.
2. To steal information
Some people create viruses that can pass through the traffic going in and out of a computer to
acquire information such as passwords, credit card number and its verification value, as well as
other online account information. Imagine the damage a person can get from such malware.

3. To inconvenience others
Some malwares are created to cause trouble and inconvenience to people and companies
because it is entertaining and enjoyable to the people who created the malware. The network
system of banks and other institutions can crash due to the effect of such malware.
Did you Know?
Cybercrime offenses such as hacking, computer fraud, spam, and libel are
punishable by Philippine Law as stated in the Republic Act No. 10175.

C:\_ Command Prompt


C:\Users\LittleDetectives> C:\
LEVEL 1 COMPLETE

Aha! So those are their reasons. Okay detectives, let’s continue digging.
How do we know that our computers are being attacked by viruses?

C:\STARTING INVESTIGATION...

7
Let us check if your answers are correct.

Here are the top 6 signs your Computer has a virus.

1. Slow processing and performance

If you encounter a sudden change in the performance of your


computers such as slow processing and a longer time in booting
programs that you didn’t normally experience, your system might be
infected.

2. Unexpected computer behavior

If your computer starts having unusual behavior such as


opening a file on its own, scrolls or acts as if a key has been pressed
when it hasn’t and stops responding to clicks. Do not think it’s a
ghost, you may be experiencing a computer virus symptom.

3. Sudden freezes and crashes

Since some viruses target computer hard drive, it may cause


damage and bring devastating effects on your computer such as
sudden freezing or worst, a crash.

4. Error messages

You should watch out for sudden appearance of unexpected


pop-up windows. Computers know something is wrong before we
even notice it. Sudden appearance of pop-up messages warning you
about missing application files or system is one of the symptoms
your computer is infected.

5. Missing or extra files


Remember to keep track of the size of your hard drive. Some
viruses may delete files unexpectedly or may install unwanted copies
of itself on your computer.

6. Hardware and accessory problems


Are you experiencing problems with your computer display?
For instance, mixing pixels or color problems, this can be a sign that a
virus has penetrated your system.

8
C:\_ Command Prompt
C:\Users\LittleDetectives> C:\
LEVEL 2 COMPLETE

Hmm.. Interesting.. Let’s continue exploring.

Can you give an example of a computer virus?

C:\STARTING INVESTIGATION...

Let us check if your answers are correct.

Basic Computer Viruses

1. Trojan Horse

Trojan horse appears as an interesting software but


when installed it allows intruders to gain access on your files.

2. Worms

A malicious code that copies and multiplies itself using


computer networks and security flaws. I Love You or Love Bug virus
is one of the well known and destructive examples of worm.

3. Email Virus

An email virus is a virus that is sent with or attached to email


communications. It spreads by automatically forwarding itself to
thousands of people. Melissa is one of the most notorious examples
of this virus.

9
Types of Computer Viruses

1. File Virus (File Infecting Virus)

It is a type of malware that infects executable files with the intent to cause permanent damage
or make them unusable. A file-infecting virus overwrites code or inserts infected code into an
executable file. This type of virus can infect several operating systems. A file-infecting virus may
also be known as a file injector. Examples of this type of virus are Jerusalem and Cascade.

2. Boot Sector Virus

A boot sector virus is a computer virus that infects a storage device's master boot record
(MBR). This virus copies its infected code either to the floppy disk's boot sector or to the hard
disk's partition table. The propagation of boot sector viruses has become very rare since the decline
of floppy disks. Also, present-day operating systems include boot-sector safeguards that make it
difficult for boot sector viruses to infect them. Michaelangelo and Stoned are examples of this
type of virus.
3. Multipartite Virus

A multipartite virus is also known as a hybrid virus. It is a fast-moving virus that uses file
infectors or boot infectors to attack the boot sector and executable files simultaneously. Most
viruses either affect the boot sector, the system or the program files. The multipartite virus can
affect both the boot sector and the program files at the same time, thus causing more damage than
any other kind of virus. A multipartite virus infects computer systems multiple times and at
different times. In order for it to be eradicated, the entire virus must be removed from the system.
Examples of this type of virus are Anthrax and Tequila.

4. Macro Virus

A macro virus is a computer virus that replaces a macro, which enables a program to work
and activates a designated group of actions and commands. When these actions and commands are
replaced by a virus, this can cause significant harm to a computer. Macro viruses may be spread
through email attachments, modems and on the internet, networks, and disks. Concept is first
known example of macro virus.

5. Denial of Service Attack

A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to
prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends
excessive messages asking the network or server to authenticate requests that have invalid return
addresses. In simple terms, this attacks functions by flooding

10
targeted computers with requests, until it can no longer be processed leading to denial of service.
Examples of this type of virus are Ping of Death Attack and Teardrop Attack.

6. Hoax

A virus hoax is an email that provides a warning about a virus, worm, or some other disaster,
and forces recipients to forward the message. Hoax emails are often sent from what appears to be a
reliable source, which can make determining whether to heed their message difficult for recipients.
Although such hoaxes are usually benign, they suggest that recipients delete important files from
their computers or download an infected attachment. 2400 Baud Modem Virus and Good Time
Virus are some of the examples of this type of virus.

C:\_ Command Prompt

C:\Users\LittleDetectives>
C:\LEVEL 3 COMPLETE

ALERT! Let us keep these viruses away from our computers.


How can you prevent virus attacks?

C:\STARTING INVESTIGATION...

Let us check if your answers are correct.

Here are some tips on how to prevent virus attacks.

1. Think, before you click.


Avoid websites that you are unfamiliar with or seems unsecured. Be cautious when you
access such sites and as a rule if you don’t know it, don’t click it.

2. Hands off with unfamiliar messages


Do not open messages from unfamiliar sources. By doing this you’ll be able to protect your
computer from viruses that hide or camouflage themselves as an email attachment.

11
3. Increase external security
Do not let other people use your computer without your permission. Though we know that
sharing is caring when it comes to a computer you might want to think twice. Not all people are
knowledgeable on the prevention of computer viruses, so sharing your computer with others might
cause you big damage like corruption of your data or worst, a total system failure.

4. Never download unrecognized files or software


Be cautious about the different free software offered online especially files with .exe
extension. Music, videos, and pictures from untrusted sources may also contain malware.

5. Keep your anti virus software up-to-date


Antivirus software is a helpful tool in preventing viruses from penetrating your computer.
Antivirus software may be bought online or in a trusted physical store. Regularly update your
antivirus for it to function at its best. Software update increases the capability of your
antivirus against new malware. It contains the latest file needed in order for your computer to
combat such threats. To maximize your antivirus be sure to scan your computer regularly to check
for any malware present in your system. Do
not install multiple antivirus software.

You are responsible for keeping your computer clean of


viruses. To do that always remember to THINK.

C:\_ Command Prompt


C:\Users\LittleDetectives>
C:\LEVEL 4 COMPLETE C:\
INVESTIGATION COMPLETED
C:\VIRUSES ELIMINATED

HOORAY! Good Job detectives. You are now ready for the
next phase. Time to check your understanding.

12
What’s More

Independent Activity 1
Describe Me!

Directions: Complete the concept map below by describing a computer virus. Write your answer
on the space provided.

COMPUTER
VIRUS

Based on your descriptions above, how will you define a computer virus?

13
Independent Assessment 1
A. Multiple Choice
Directions:
Choose the letter of the best answer. Write your answers on the space
provided before each number.

1. Who is the first person to define computer virus?


A. Ada Byron C. Fred Cohen
B. Charles Babbage D. Frederick Collen
2. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?
A. Malware C. Virus
B. Trojan Horse D. Worms
3. Alex enjoys creating malicious codes that can cause trouble for some companies and
people. What do you think is the reason why Alex created such codes?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above
4. Zara creates viruses that specify in keystroke logging to capture passwords, credit card
number, and verification value. What do you think is the reason why Zara created such virus?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above
5. John creates software that masks itself as free antivirus software which in time will
ask the user to upgrade to premium or pro version by paying monthly or annually. What do
you think is the reason why John creates such virus?
A. to earn money C. to inconvenience others
B. to steal information D. none of the above

B. Fact or Bluff
Directions: Write F if the statement is a fact and B if the statement is a bluff.

1. All viruses are malwares but not all malwares are viruses.
2. Computer virus was first defined in 1993.
3. Some people create viruses to earn money.
4. Enjoyment and enthusiasm are some of the reasons why people create malicious codes.
5. Programs that secretly acquire personal information and account details is helpful to your
computer.

14
Independent Activity 2
Picture Me Out!
A. Directions: Analyze the pictures shown below and identify the different virus symptoms
present. Write your answer on the space provided.

1. 2.

4.

3. 5.

B. Directions: Identify and describe the following examples of computer viruses based on the
given illustrations. Write your answer on the space provided.

1. -

2. -

3. -

4. -

5. -

15
Independent Assessment 2
A. Matchy - Matchy!
Directions: Match Column A to Column B. Write the letter of your answer on the space
provided.

COLUMN A COLUMN B

1. a type of virus that infects a storage A. Boot Sector Virus


device's master boot record B. Denial of Service (DoS)
2. it is also known as a hybrid virus C. Email Virus

3. it is a virus that is sent with or D. File Virus

attached to email communications E. Hoax


F. Macro Virus
4. it is a type of malware that infects
G. Multipartite Virus
executable files with the intent to cause
permanent damage or make them unusable
5. it is a type of virus attacks that floods
targeted computers with requests, until it
can no longer be processed

B. You Complete Me!


Directions: Complete the table below by supplying the missing term. Write your answer on the
space provided.

Type of Virus Example

1 Hoax

2 Teardrop Attack

3 Jerusalem

4 Macro

5 Boot Sector

16
Independent Activity 3

Violators!

Directions: Analyze the given situations below and identify which among the tips in preventing
computer viruses has not been followed and give a short explanation of your answer.
Write your answer on the blank provided.

Situation 1

Amanda bought a personal computer for her son. Her son, Anton, is very fond
of computer games so he looked for free software on the web for his favorite basketball
game.

Answer:

Situation 2

Amelia is currently writing her thesis for her graduate studies. She is afraid of losing
her files so she installed three antivirus software to increase her computers protection.

Answer:

Situation 3

Mike has been receiving several emails from his friends with the same
attachments . Out of his curiosity, he decided to open one of the messages.

Answer:

Situation 4

While browsing on the web, Mars saw a pop-up indicating that he won a raffle

17
draw. Due to his excitement he immediately clicked the said pop-up.

Answer:

Situation 5

Claire leaves her laptop unattended and allows her friends to use it whenever they need
it.

Answer:

Independent Assessment 3
A. Modified True or False
Directions:
Write TRUE if the statement is correct. In case it is false, CHANGE the underlined
word or phrase to make the statement correct. Write your answer on the space
provided.

1. Be cautious when you access unfamiliar sites and as a rule if you don’t
know it don’t click it..

2. Always open messages even from unfamiliar sources.


3. It is a must to update your anti virus software whenever an update is
available.

4. All people are knowledgeable on the prevention of computer viruses.

5. Music, videos and pictures from untrusted sources may also


contain malware.

B. Do’s or Don’ts
Directions: Write DO if the action helps protect your computer and DON’T if the action can
harm your computer. Write your answer on the space provided.

1. Always update your anti virus software.

2. Download multiple anti virus software.

3. Download music, movies and games from any internet website.

18
4. Allow other people to use your computer with your supervision.

5. Access unfamiliar and unsecured websites to download files.

What I Have Learned

What level are you?

Directions: Using the given rubrics below, try to assess the level of your understanding
regarding the different topics presented in this module. Encircle the level of
understanding in which you feel you are into.

Level of Un-
Scale Description
derstanding

I have a high understanding of all the topics with


5 Outstanding no mistakes in the activities and assessment

I have a high understanding of most of the topics


4 High with small mistakes in the activities and
assessments

I understand most of the topics but I still need a


3 Moderate little improvement in the activities and
assessments

I have basic understanding of the topics, but I still


2 Low need to review and retake some activities and
assessments

I have no understanding of the topics. I need to


1 None review and retake all the activities and
assessments

19
Topics in the module Scale

1. I can describe a computer virus 1 2 3 4 5

2. I can state the reasons why people create


1 2 3 4 5
computer viruses.

3. I can identify some virus symptoms. 1 2 3 4 5

4. I can differentiate and give examples of com-


1 2 3 4 5
puter viruses.

5. I can prevent malicious code attacks 1 2 3 4 5

What I Can Do

Co-Virus

Directions: We are currently facing a pandemic due to a virus called “Corona”, using a
Venn diagram, show the similarities and differences of computer virus and corona
virus.

Computer Corona
Virus
Virus

20
Assessment

A. Multiple Choice

Directions: Choose the letter of the best answer. Write your answer on the space provided
before each number.

1. How will you describe a computer virus?

A. destructive

B. destroys data

C. malicious computer program

D. all of the above

2. Which statement about computer virus is true?

A. it boosts your computer

B. all virus are destructive

C. virus can occur naturally

D. it can replicate by copying itself on another program

3. Which among the following is a sign that your computer might be infected by
a virus?

A. freezes and crashes often

B. unexpected computer behavior

C. slow processing and performance

D. all of the above

4. How can you prevent a computer virus from entering your computer?

A. by installing multiple antivirus software

B. by avoiding unfamiliar/unsecured websites

C. by saving username and password on the browser

D. all of the above

21
5. What malware appears as an interesting software but when installed, allows
intruders to gain access on your files?

A. Email virus

B. Boot sector

C. Trojan horse

D. Worms

B. Identification

Directions: Read the following statements carefully and identify what is being described.
Write your answer on the space provided before each number

1. An email that provides a warning about a virus, worm or some


other disaster, and urges recipients to forward the message.
2. It is a type of malware that infects executable files with the intent to
cause permanent damage or make them unusable.
3. A type of malicious computer program that infects computer, it
replicates by copying itself to another program without the
knowledge of the user.
4. It is a fast-moving virus that uses file infectors or boot infectors to
attack the boot sector and executable files simultaneously.
5. A malicious code that copies and multiplies itself using computer
networks and security flaws.
6. A helpful tool in preventing viruses from penetrating into your
computer.
7. Any type of attack where the attackers (hackers) attempt to
prevent legitimate users from accessing the service.
8. A file-infecting virus may also be known as a .
9. It is one of the well known and destructive example of worm
created by a Filipino college student.
10. These viruses copy their infected code either to the floppy
disk's boot sector or to the hard disk's partition table.

22
Additional Activities

Let’s Organize!

Directions: Fill out the missing terms in the graphic organizer below. Write your answer on the
box provided.

Computer
Virus

Types Symptoms Prevention

23
For inquiries or feedback, please write or call:
Department of Education, Schools Division of Bulacan Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS) Capitol Compound,
Guinhawa St., City of Malolos, Bulacan
Email address: [email protected]

27

You might also like