Ste Cs1q1m6 Smnhs
Ste Cs1q1m6 Smnhs
Ste Cs1q1m6 Smnhs
Computer Science I
Quarter 1 - Module 6
Computer Viruses
Computer Science I– Grade 7
Alternative Delivery Mode
Quarter 1 - Module 6 : Computer Viruses
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist
in any work of the Government of the Philippines. However, prior approval of
the government agency or office wherein the work is created shall be necessary
for exploitation of such work for profit. Such agency or office may, among other
things, impose as a condition the payment of royalties.
Management Team
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Rainelda M. Blanco, PhD
Education Program Supervisor - LRMDS
Agnes R. Bernardo, PhD
EPS-Division ADM Coordinator
Marinella P. Garcia Sy, PhD
EPS – Science
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
This module was collaboratively designed, developed and reviewed by educators from public
institutions to assist you, the teacher or facilitator, in helping the learners meet the standards set by
the K to 12 Curriculum while overcoming their personal, social, and economic constraints in
schooling.
This learning resource hopes to engage the learners into guided and independent learning activities
at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st
century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also need to
keep track of the learners’ progress while allowing them to manage their own learning. Furthermore,
you are expected to encourage and assist the learners as they do the tasks included in the module.
1
This is a brief drill or review to help you link the
current lesson with the previous one.
What’s In
In this portion, the new lesson will be introduced to you
in various ways; a story, a song, a poem, a problem
What’s New opener, an activity or a situation.
This section provides a brief discussion of the lesson.
This aims to help you discover and understand new
What is It concepts and skills.
This comprises activities for independent practice to
solidify your understanding and skills of the topic. You
may check the answers to the exercises using the Answer
What’s More
Key at the end of the module.
This includes questions or blank sentence/ paragraph to
be filled in to process what you learned from the lesson.
What I Have Learned
This section provides an activity which will help you
transfer your new knowledge or skill into real life
What I Can Do situations or concerns.
2
What I Need to Know
This module encourages you to be knowledgeable about the prevention of viruses and
other malicious code that affect computers. Various activities are provided for you
to perform to strengthen your knowledge and skills regarding the topic.
What I Know
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space provided.
1. What do you call a malicious code that infects computer by copying and replicating
without the knowledge of the user?
A. Malware C. Virus
B. Trojan Horse D. Worms
2. Which of the following is NOT a reason why people create viruses?
3
5. When was the term “computer virus” first defined?
A. 1943 C. 1999
B. 1983 D. 2001
B. True or False
Directions: Write T if the statement is true and F if the statement is false. Write your answer
on the space provided before each number.
6. File virus is also known as file injector.
10. All viruses can cause your computer to suddenly freeze and crash.
11. Some people create virus to steal confidential information.
13. Operating system software is a helpful tool in preventing viruses from penetrating
into your computer.
14. A worm is a virus sent with or attached to email communication and spreads by
automatically forwarding itself to thousands of people.
15. Regular scanning of your computer is helpful in preventing viruses from penetrating
your system.
What’s In
Directions: Arrange the jumbled letters in the diagram below and describe how an operating system
works by completing the paragraph . Write your answer on the space provided.
GOREAITNP
CATPPAIONLI MTYESS
SURE DAWARRHE
4
What’s New
SEARCHING...
Word Hunt
Directions: Search and list down 10 words/phrases associated with computer viruses from the box
below. Words appear straight across, backward straight across, up and down, down and
up, and diagonally. Write your answer on the blank provided.
V S T U W V W T Z X Y M I N R
H I X A O H D R R R L H O E S
G W C X R Z A O W H O F P H O
G M N U M B V J C X V E Z A S
L D F G S H J A K L E P O I U
E R A W L A M N Y R T R E W Q
I S T A M P E H C A Z X C V B
M L N D G H I O J K K O L A L
I U O M J K I R U T F H D F D
S M A V P O W S F E M I N R W
S L S W E P R E L A A S R E W
Y Q D E N Y Q O P P C O R T U
O W F T N O O F I N R I N G Y
P U E Y Y U F U R E O F I L E
P I T R U R O T C E S T O O B
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
The activities in this module are designed to help learners to gradually master the desired
competency. In order for him/her to perform the desired tasks and achieve the desired
outcomes you need to give the support and guidance he/she needed.
5
What is It
Computer Viruses
We are now living in the so-called millennial era where technology is widely used.
Computers, laptops, and smartphones no longer impose a status symbol; it has become a necessity.
Cars today are safer and more efficient, thanks to ECU or electronic control unit. Supplies of food
and drugs were distributed to different supermarkets and pharmacies every day to meet the
demands, thanks to the good computerized inventory system. But, as technology advances, we also
encounter a new type of threat: computer viruses.
ALERT!!!
VIRUS HAS BEEN DETECTED!
THINK!
Why do you think people create computer viruses? List down at least 2 reasons
C:\STARTING INVESTIGATION...
6
Let us check if your answers are correct.
Oftentimes, different types of infections were concealed as free antivirus software. When
executed it will scan your computer and will show some viruses were found. And to remove those,
you’ll be asked to download the software and pay for the pro or premium version of the application.
2. To steal information
Some people create viruses that can pass through the traffic going in and out of a computer to
acquire information such as passwords, credit card number and its verification value, as well as
other online account information. Imagine the damage a person can get from such malware.
3. To inconvenience others
Some malwares are created to cause trouble and inconvenience to people and companies
because it is entertaining and enjoyable to the people who created the malware. The network
system of banks and other institutions can crash due to the effect of such malware.
Did you Know?
Cybercrime offenses such as hacking, computer fraud, spam, and libel are
punishable by Philippine Law as stated in the Republic Act No. 10175.
Aha! So those are their reasons. Okay detectives, let’s continue digging.
How do we know that our computers are being attacked by viruses?
C:\STARTING INVESTIGATION...
7
Let us check if your answers are correct.
4. Error messages
8
C:\_ Command Prompt
C:\Users\LittleDetectives> C:\
LEVEL 2 COMPLETE
C:\STARTING INVESTIGATION...
1. Trojan Horse
2. Worms
3. Email Virus
9
Types of Computer Viruses
It is a type of malware that infects executable files with the intent to cause permanent damage
or make them unusable. A file-infecting virus overwrites code or inserts infected code into an
executable file. This type of virus can infect several operating systems. A file-infecting virus may
also be known as a file injector. Examples of this type of virus are Jerusalem and Cascade.
A boot sector virus is a computer virus that infects a storage device's master boot record
(MBR). This virus copies its infected code either to the floppy disk's boot sector or to the hard
disk's partition table. The propagation of boot sector viruses has become very rare since the decline
of floppy disks. Also, present-day operating systems include boot-sector safeguards that make it
difficult for boot sector viruses to infect them. Michaelangelo and Stoned are examples of this
type of virus.
3. Multipartite Virus
A multipartite virus is also known as a hybrid virus. It is a fast-moving virus that uses file
infectors or boot infectors to attack the boot sector and executable files simultaneously. Most
viruses either affect the boot sector, the system or the program files. The multipartite virus can
affect both the boot sector and the program files at the same time, thus causing more damage than
any other kind of virus. A multipartite virus infects computer systems multiple times and at
different times. In order for it to be eradicated, the entire virus must be removed from the system.
Examples of this type of virus are Anthrax and Tequila.
4. Macro Virus
A macro virus is a computer virus that replaces a macro, which enables a program to work
and activates a designated group of actions and commands. When these actions and commands are
replaced by a virus, this can cause significant harm to a computer. Macro viruses may be spread
through email attachments, modems and on the internet, networks, and disks. Concept is first
known example of macro virus.
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to
prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends
excessive messages asking the network or server to authenticate requests that have invalid return
addresses. In simple terms, this attacks functions by flooding
10
targeted computers with requests, until it can no longer be processed leading to denial of service.
Examples of this type of virus are Ping of Death Attack and Teardrop Attack.
6. Hoax
A virus hoax is an email that provides a warning about a virus, worm, or some other disaster,
and forces recipients to forward the message. Hoax emails are often sent from what appears to be a
reliable source, which can make determining whether to heed their message difficult for recipients.
Although such hoaxes are usually benign, they suggest that recipients delete important files from
their computers or download an infected attachment. 2400 Baud Modem Virus and Good Time
Virus are some of the examples of this type of virus.
C:\Users\LittleDetectives>
C:\LEVEL 3 COMPLETE
C:\STARTING INVESTIGATION...
11
3. Increase external security
Do not let other people use your computer without your permission. Though we know that
sharing is caring when it comes to a computer you might want to think twice. Not all people are
knowledgeable on the prevention of computer viruses, so sharing your computer with others might
cause you big damage like corruption of your data or worst, a total system failure.
HOORAY! Good Job detectives. You are now ready for the
next phase. Time to check your understanding.
12
What’s More
Independent Activity 1
Describe Me!
Directions: Complete the concept map below by describing a computer virus. Write your answer
on the space provided.
COMPUTER
VIRUS
Based on your descriptions above, how will you define a computer virus?
13
Independent Assessment 1
A. Multiple Choice
Directions:
Choose the letter of the best answer. Write your answers on the space
provided before each number.
B. Fact or Bluff
Directions: Write F if the statement is a fact and B if the statement is a bluff.
1. All viruses are malwares but not all malwares are viruses.
2. Computer virus was first defined in 1993.
3. Some people create viruses to earn money.
4. Enjoyment and enthusiasm are some of the reasons why people create malicious codes.
5. Programs that secretly acquire personal information and account details is helpful to your
computer.
14
Independent Activity 2
Picture Me Out!
A. Directions: Analyze the pictures shown below and identify the different virus symptoms
present. Write your answer on the space provided.
1. 2.
4.
3. 5.
B. Directions: Identify and describe the following examples of computer viruses based on the
given illustrations. Write your answer on the space provided.
1. -
2. -
3. -
4. -
5. -
15
Independent Assessment 2
A. Matchy - Matchy!
Directions: Match Column A to Column B. Write the letter of your answer on the space
provided.
COLUMN A COLUMN B
1 Hoax
2 Teardrop Attack
3 Jerusalem
4 Macro
5 Boot Sector
16
Independent Activity 3
Violators!
Directions: Analyze the given situations below and identify which among the tips in preventing
computer viruses has not been followed and give a short explanation of your answer.
Write your answer on the blank provided.
Situation 1
Amanda bought a personal computer for her son. Her son, Anton, is very fond
of computer games so he looked for free software on the web for his favorite basketball
game.
Answer:
Situation 2
Amelia is currently writing her thesis for her graduate studies. She is afraid of losing
her files so she installed three antivirus software to increase her computers protection.
Answer:
Situation 3
Mike has been receiving several emails from his friends with the same
attachments . Out of his curiosity, he decided to open one of the messages.
Answer:
Situation 4
While browsing on the web, Mars saw a pop-up indicating that he won a raffle
17
draw. Due to his excitement he immediately clicked the said pop-up.
Answer:
Situation 5
Claire leaves her laptop unattended and allows her friends to use it whenever they need
it.
Answer:
Independent Assessment 3
A. Modified True or False
Directions:
Write TRUE if the statement is correct. In case it is false, CHANGE the underlined
word or phrase to make the statement correct. Write your answer on the space
provided.
1. Be cautious when you access unfamiliar sites and as a rule if you don’t
know it don’t click it..
B. Do’s or Don’ts
Directions: Write DO if the action helps protect your computer and DON’T if the action can
harm your computer. Write your answer on the space provided.
18
4. Allow other people to use your computer with your supervision.
Directions: Using the given rubrics below, try to assess the level of your understanding
regarding the different topics presented in this module. Encircle the level of
understanding in which you feel you are into.
Level of Un-
Scale Description
derstanding
19
Topics in the module Scale
What I Can Do
Co-Virus
Directions: We are currently facing a pandemic due to a virus called “Corona”, using a
Venn diagram, show the similarities and differences of computer virus and corona
virus.
Computer Corona
Virus
Virus
20
Assessment
A. Multiple Choice
Directions: Choose the letter of the best answer. Write your answer on the space provided
before each number.
A. destructive
B. destroys data
3. Which among the following is a sign that your computer might be infected by
a virus?
4. How can you prevent a computer virus from entering your computer?
21
5. What malware appears as an interesting software but when installed, allows
intruders to gain access on your files?
A. Email virus
B. Boot sector
C. Trojan horse
D. Worms
B. Identification
Directions: Read the following statements carefully and identify what is being described.
Write your answer on the space provided before each number
22
Additional Activities
Let’s Organize!
Directions: Fill out the missing terms in the graphic organizer below. Write your answer on the
box provided.
Computer
Virus
23
For inquiries or feedback, please write or call:
Department of Education, Schools Division of Bulacan Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS) Capitol Compound,
Guinhawa St., City of Malolos, Bulacan
Email address: [email protected]
27