TLE-TE 10_Q3_ICT CSS_Mod3_USLeM RTP (1)

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 10

Department of Education

NATIONAL CAPITAL REGION

SUPPLEMENTARY
LEARNING MATERIALS
for Junior High
School Learners

TECHNOLOGY AND LIVELIHOOD EDUCATION


GRADE 10
ICT-COMPUTER SYSTEM SERVICING
QUARTER3 – WEEK 3
(Module 3)

LEARNING COMPETENCY:
LO 4. Install Application Software
4.3 Access software updates in accordance with manufacturer’s
recommendations and requirements
TLE_IACSS9-12ICCS-IIIa-e31
HOW TO USE THIS SUPPLEMENTARY LEARNING
MATERIALS
Before you start answering the module, I want you to set aside
other tasks that will disturb you while enjoying the lessons. Read the
simple instructions below to successfully enjoy the objectives of this kit.
Have fun!
1. Follow carefully all the contents and instructions indicated in every
page of this module.
2. Write on your notebook or any writing pad the concepts about the
lessons. Writing enhances learning, that is important to develop
and keep in mind.
3. Perform all the provided activities in the module.
4. Let your facilitator/guardian assess your answers.
5. Analyse conceptually the post test and apply what you have learned.
6. Enjoy studying!

ANTIVIRUS SOFTWARE

EXPECTATIONS

At the end of the module, you should be able to:


1. Identify commonly known anti-virus software to protect data and computer systems
from becoming corrupted.
2. Understand the importance of antivirus that will help protect your computer
against viruses.
3. Recognize how to protect your computer against viruses by knowing how antivirus
works.

PRETEST

Directions: Read each statement carefully. Choose the letter which corresponds to the correct
answer and write your answers on a separate sheet of paper.

1. Any anti-virus is a security program you install on your computer to protect it from getting
infected by malware. Which of the following does an anti-virus software cannot do?
A. Delete your files and emails C. Delete malware
B. Scan your computer D. Warn you about dangers

2
2. The technician is responsible for applying the most recent updates. Why do you need to
update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware

3. Malware is the collective name for a number of malicious software variants. Which is not a
type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
4. You can purchase anti-virus software as a standalone solution, or it is often included as
part of a security package. Which is not a maker of an anti-virus software?
A. Spacefiller C. McAfee
B. Bullguard D. Kaspersky
5. It is a malware program that inserts copies of itself into other computer programs,
data files, or the boot sector of the hard drive.
A. anti-Virus C. virus
B. BIOS D. disk cleanup
6. It is a program that copies itself to hardware, it comes through the network and it
copies itself several times to the device until the machine slows down.
A. ransomware C.trojans
B. metamorphic D. worm
7. What is the name of the Anti-virus which uses this icon?
A. Avast
B. Avira
C. AVG
D. Umbrella

8. This is a software that's designed to gather data from a computer or other devices and
forward it to a third party without the consent or knowledge of the user.
A. adware
B. spyware
C. ransomware
D. malware

9. What is the name of the Anti-virus which uses this icon?


A. Avast C. AVG
B. Avira D. Umbrella

10. Why would an identity thief most likely want to steal your information?
A. To be your friend on social media for a tough time and to offer support
B. To help with financial problems & difficulties and end your stress
C. To help you with your homework and keep well organize your assignments
D. To access your bank accounts, credit cards, and other financial resources.

3
LOOKING BACK

I. Directions: Identify what is being described in the sentence. Write your answer on
the space provided.
1. This is a utility built into different operating systems which can be used
to create, delete, and format partitions assign drive letters
2. is the process that prepares a file system in a partition for
files to be stored.
3. Any ordinary files are automatically relocated on the disk to create the
new unallocated space.
4. The hard disk partition where both Windows OS and other data can be
stored, and it is the only partition that can be set active.
5. There can be only one per hard drive, but it can be subdivided into
smaller sections.

BRIEF INTRODUCTION

As a future computer technician, you need to understand computers and security.


Failure to implement proper security procedures can affect users, computers, and the general
public. private information, company secrets, financial data, computer equipment, and items
about national security are placed at risk if proper security procedures are not followed.

Virus protection software, known as antivirus software, is software designed to


detect, disable, and remove viruses, worms, and Trojans before they infect a computer.
Antivirus software becomes outdated quickly, however. The technician is responsible for
applying the most recent updates, patches, and virus definitions as part of a regular
maintenance schedule. Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the company.
Organizations also make employees aware of the dangers of opening e-mail attachments that
may contain a virus or worm.

Antivirus Software
Anti-virus is a security program you install on your computer or mobile device to protect it
from getting infected by malware. The term “malware” is a catch-all phrase for any type of
malicious software, such as viruses, worms, Trojans and spyware. In fact, the term malware
comes from combining the words malicious and software. If your computer has become infected
by malware, a cyber attacker can capture all your keystrokes, steal your documents or use your
computer to attack others. Contrary to what some people believe, any operating system,
including Mac OS X and Linux, can be infected.

4
You can purchase anti-virus software as a standalone solution, or it is often included as
part of a security package. The problem is that anti-virus can no longer keep up with cyber
attackers; they are constantly developing and releasing new types of malware. There are so
many new versions of malware released every day that no anti-virus program can detect and
protect against all of them. Therefore, it is important for you to understand that anti-virus will
help protect your computer.
TYPES OF ANTIVIRUS
Anyone who finds out on the internet and then knows about various antivirus programs
can benefit by allowing you to stay safe when you are online. Accessing a website can open the
way for hackers to infect your computer with a virus, and they are also able to gather
information or spy on you secretly.

1. Avira antivirus - is a powerful antivirus with some of the best


malware protection in the industry. It's lightweight, easy to use, and
provides great value for the money. Avira's additional features all
work really well, and while there are a lot of them, they're all super
easy to set up and use.
Source: https://favpng.com
Avira antivirus

2. Microsoft antivirus - Microsoft security essentials provide real-


time protection for your home or small business PC that guards
against viruses, spyware, and other malicious software. Running
more than one antivirus program at the same time can potentially
cause conflicts that affect PC performance.

Source: https://favpng.com
Microsoft antivirus

3. Avast Antivirus is a family of cross-platform internet security


applications developed by Avast for Microsoft Windows, macOS,
Android and iOS. The Avast Antivirus products include freeware and
paid versions that provide computer security, browser security,
antivirus software, firewall, anti-phishing, antispyware, and anti-spam
among other services.
Source: https://favpng.com
Avast Antivirus

Source: www.computerflu.com
Commonly Known Anti-Virus Software

5
Security Attacks
To successfully protect computers and the network, a technician must understand both
of the following types of threats to computer security:
Physical: Events or attacks that steal, damage, or destroy such equipment as servers,
switches, and wiring.

Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal
information.
Threats to security can come from inside or outside an organization, and the level of
potential damage can vary greatly. Potential threats include the following:

✔ Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
❖ Malicious threats are when an employee intends to cause damage.
❖ Accidental threats are when the user damages data or equipment
unintentionally.
✔ External: Users outside an organization who do not have authorized access to the
network or resources. External attacks can be characterized as follows:
❖ Unstructured attacks, which use available resources, such as passwords or
scripts, to gain access to and run programs designed to vandalize.
❖ Structured attacks, which use code to access operating systems and software.

Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly changing as
attackers find new ways to gain entry and commit their crimes.

Computer virus
Computer viruses are created with malicious intent and sent by attackers. A virus is
attached to small pieces of computer code, software, or document. The virus executes when
the software is run on a computer. If the virus spreads to other computers, those computers
could continue to spread the virus. Malware is the collective name for a number of malicious
software variants, including viruses, ransomware and spyware.

A virus is transferred to another computer through email, file transfers, and instant
messaging. The virus hides by attaching itself to a file on the computer. When the file is
accessed, the virus executes and infects the computer. A virus has the potential to corrupt or
even delete files on your computer, use your email to spread itself to other computers, or even
erase your hard drive. Some viruses can be exceptionally dangerous. The most damaging type
of virus is used to record keystrokes. Attackers can use these viruses to harvest sensitive
information, such as passwords and credit card numbers.

A worm is a self-replicating program that is harmful to networks. A worm uses the


network to duplicate its code to the hosts on a network, often without any user intervention. It is
different from a virus because a worm does not need to attach to a program to infect a host.
Even if the

6
worm does not damage data or applications on the hosts it infects, it harms networks because it
consumes bandwidth.
A Trojan horse technically is a worm. It does not need to be attached to other software.
Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the
scenes it does another. Trojans often are disguised as useful software. The Trojan program can
reproduce or replicate like a virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed to perform the repairs, and
employees may lose or have to replace data.

Ransomware is malicious software that infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. This class of malware is a
criminal money making scheme that can be installed through deceptive links in an email
message, instant message or website.

A Spyware is unwanted software that infiltrates your computing device, stealing your
internet usage data and sensitive information. Spyware is classified as a type of malware -
malicious software designed to gain access to or damage your computer, often without your
knowledge.

ACTIVITIES

Directions: Use the internet to identify 5 best antiviruses for PC computers. Draw the
anti-virus logo inside the box and make a short description about its
features.

7
REMEMBER

Most antivirus programs are available for Windows, Unix platforms, and Macintosh but
most antivirus software is made for Windows systems. This is because most hackers target
viruses to computers with Windows systems. Therefore, virus protection like antivirus is very
important for Windows users. If you are a Windows user, you should have at least one antivirus
program installed on your computer, or your smartphone if it also uses Windows system.

CHECKING YOUR UNDERSTANDING

Directions. Complete the statement below based on what did you learned from the
lesson. Write your answers on a separate sheet of paper.

1. In this module I have learned that…

2. I still have questions related


to…
3. I can help my classmate in….

4. I can use antivirus


to…
5. The most interesting thing I have learned is….

POST TEST

Directions: Read each statement carefully. Choose the letter which corresponds to the
correct answer and write your answers on a separate sheet of paper.

1. It is a program that copies itself to hardware, it comes through the network and it
copies itself several times to the device until the machine slows down.
A. Ransomware C. Trojans
B. Metamorphic D. Worm

2. What is the name of the Anti-virus which is being represented by the icon?
A. Avast C. AVG
B. Avira D. Umbrella

8
3. This is a software that's designed to gather data from a computer or other devices and
forward it to a third party without the consent or knowledge of the user.
A. Adware C. Ransomware
B. Spyware D. Malware

4. What is the name of the Anti-virus which is being represented by the icon?
A. Avast
B. Avira
C. AVG
D. Umbrella
5. Why would an identity thief most likely want to steal your information?
A. To be your friend on social media on a tough time and offer support
B. To help with financial problems & difficulties and end your stress
C. To help you with your homework and well organize your assignments
D. To access your bank accounts, credit cards, and other financial resources.
6. Any Anti-virus is a security program you install on your computer to protect it from getting
infected by malware. Which does anti-virus software not do?
A. Delete your files and emails C. Delete malware
B. Scan your computer D. Warn you about dangers
7. The technician is responsible for applying the most recent updates. Why do you need to
update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware
8. Malware is the collective name for a number of malicious software variants. Which is not
a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
9. You can purchase an anti-virus software as a standalone solution, or it is often included
as part of a security package. Which is not a maker of anti-virus software?
A. Spacefiller C. McAfee
B. Bullguard D. Kaspersky
10. It is a malware program that inserts copies of itself into other computer programs,
data files, or the boot sector of the hard drive.
A. Anti-Virus C. Virus
B. BIOS D. Disk Clean up

ANSWER KEY

9
REFERENCES

Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood


Education Learning Module – Grade 9 - Information and Communications
Technology Computer Hardware Servicing CHS 9.

Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood


Education Learning Module – Grade 10 - Information and Communications
Technology Computer Hardware Servicing CHS 10.

Development Team of the Module

Writers: Henry A. Delos Reyes


Illustrator:
Layout Artist: Henry A. Delos Reyes
Content Editors: Eduardo T. Gallego
Language Editor: Juliene Joy M. Cabungcal
Management Team: Malcolm S. Garma, Regional Director – NCR
Alejandro G. Ibañez,CESO VI, OIC- Schools Division Superintendent
Genia V. Santos, CLMD Chief – NCR
Loida O. Balasa, CID Chief SDO Navotas City
James A. Roldan, EPP-TLE-TVL – NCR
Dennis M. Mendoza, LR EPS - NCR
Grace R. Nieves, LR/EPP-TLE-TVL, EPS SDO Navotas City
Nancy C. Mabunga, Librarian – NCR
Vergel Junior C. Eusebio, PDO II LRMS
Shirley Eva Marie V. Mangaluz, Librarian II LRMS

10

You might also like