TLE-TE 10_Q3_ICT CSS_Mod3_USLeM RTP (1)
TLE-TE 10_Q3_ICT CSS_Mod3_USLeM RTP (1)
TLE-TE 10_Q3_ICT CSS_Mod3_USLeM RTP (1)
SUPPLEMENTARY
LEARNING MATERIALS
for Junior High
School Learners
LEARNING COMPETENCY:
LO 4. Install Application Software
4.3 Access software updates in accordance with manufacturer’s
recommendations and requirements
TLE_IACSS9-12ICCS-IIIa-e31
HOW TO USE THIS SUPPLEMENTARY LEARNING
MATERIALS
Before you start answering the module, I want you to set aside
other tasks that will disturb you while enjoying the lessons. Read the
simple instructions below to successfully enjoy the objectives of this kit.
Have fun!
1. Follow carefully all the contents and instructions indicated in every
page of this module.
2. Write on your notebook or any writing pad the concepts about the
lessons. Writing enhances learning, that is important to develop
and keep in mind.
3. Perform all the provided activities in the module.
4. Let your facilitator/guardian assess your answers.
5. Analyse conceptually the post test and apply what you have learned.
6. Enjoy studying!
ANTIVIRUS SOFTWARE
EXPECTATIONS
PRETEST
Directions: Read each statement carefully. Choose the letter which corresponds to the correct
answer and write your answers on a separate sheet of paper.
1. Any anti-virus is a security program you install on your computer to protect it from getting
infected by malware. Which of the following does an anti-virus software cannot do?
A. Delete your files and emails C. Delete malware
B. Scan your computer D. Warn you about dangers
2
2. The technician is responsible for applying the most recent updates. Why do you need to
update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware
3. Malware is the collective name for a number of malicious software variants. Which is not a
type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
4. You can purchase anti-virus software as a standalone solution, or it is often included as
part of a security package. Which is not a maker of an anti-virus software?
A. Spacefiller C. McAfee
B. Bullguard D. Kaspersky
5. It is a malware program that inserts copies of itself into other computer programs,
data files, or the boot sector of the hard drive.
A. anti-Virus C. virus
B. BIOS D. disk cleanup
6. It is a program that copies itself to hardware, it comes through the network and it
copies itself several times to the device until the machine slows down.
A. ransomware C.trojans
B. metamorphic D. worm
7. What is the name of the Anti-virus which uses this icon?
A. Avast
B. Avira
C. AVG
D. Umbrella
8. This is a software that's designed to gather data from a computer or other devices and
forward it to a third party without the consent or knowledge of the user.
A. adware
B. spyware
C. ransomware
D. malware
10. Why would an identity thief most likely want to steal your information?
A. To be your friend on social media for a tough time and to offer support
B. To help with financial problems & difficulties and end your stress
C. To help you with your homework and keep well organize your assignments
D. To access your bank accounts, credit cards, and other financial resources.
3
LOOKING BACK
I. Directions: Identify what is being described in the sentence. Write your answer on
the space provided.
1. This is a utility built into different operating systems which can be used
to create, delete, and format partitions assign drive letters
2. is the process that prepares a file system in a partition for
files to be stored.
3. Any ordinary files are automatically relocated on the disk to create the
new unallocated space.
4. The hard disk partition where both Windows OS and other data can be
stored, and it is the only partition that can be set active.
5. There can be only one per hard drive, but it can be subdivided into
smaller sections.
BRIEF INTRODUCTION
Antivirus Software
Anti-virus is a security program you install on your computer or mobile device to protect it
from getting infected by malware. The term “malware” is a catch-all phrase for any type of
malicious software, such as viruses, worms, Trojans and spyware. In fact, the term malware
comes from combining the words malicious and software. If your computer has become infected
by malware, a cyber attacker can capture all your keystrokes, steal your documents or use your
computer to attack others. Contrary to what some people believe, any operating system,
including Mac OS X and Linux, can be infected.
4
You can purchase anti-virus software as a standalone solution, or it is often included as
part of a security package. The problem is that anti-virus can no longer keep up with cyber
attackers; they are constantly developing and releasing new types of malware. There are so
many new versions of malware released every day that no anti-virus program can detect and
protect against all of them. Therefore, it is important for you to understand that anti-virus will
help protect your computer.
TYPES OF ANTIVIRUS
Anyone who finds out on the internet and then knows about various antivirus programs
can benefit by allowing you to stay safe when you are online. Accessing a website can open the
way for hackers to infect your computer with a virus, and they are also able to gather
information or spy on you secretly.
Source: https://favpng.com
Microsoft antivirus
Source: www.computerflu.com
Commonly Known Anti-Virus Software
5
Security Attacks
To successfully protect computers and the network, a technician must understand both
of the following types of threats to computer security:
Physical: Events or attacks that steal, damage, or destroy such equipment as servers,
switches, and wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal
information.
Threats to security can come from inside or outside an organization, and the level of
potential damage can vary greatly. Potential threats include the following:
✔ Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
❖ Malicious threats are when an employee intends to cause damage.
❖ Accidental threats are when the user damages data or equipment
unintentionally.
✔ External: Users outside an organization who do not have authorized access to the
network or resources. External attacks can be characterized as follows:
❖ Unstructured attacks, which use available resources, such as passwords or
scripts, to gain access to and run programs designed to vandalize.
❖ Structured attacks, which use code to access operating systems and software.
Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly changing as
attackers find new ways to gain entry and commit their crimes.
Computer virus
Computer viruses are created with malicious intent and sent by attackers. A virus is
attached to small pieces of computer code, software, or document. The virus executes when
the software is run on a computer. If the virus spreads to other computers, those computers
could continue to spread the virus. Malware is the collective name for a number of malicious
software variants, including viruses, ransomware and spyware.
A virus is transferred to another computer through email, file transfers, and instant
messaging. The virus hides by attaching itself to a file on the computer. When the file is
accessed, the virus executes and infects the computer. A virus has the potential to corrupt or
even delete files on your computer, use your email to spread itself to other computers, or even
erase your hard drive. Some viruses can be exceptionally dangerous. The most damaging type
of virus is used to record keystrokes. Attackers can use these viruses to harvest sensitive
information, such as passwords and credit card numbers.
6
worm does not damage data or applications on the hosts it infects, it harms networks because it
consumes bandwidth.
A Trojan horse technically is a worm. It does not need to be attached to other software.
Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the
scenes it does another. Trojans often are disguised as useful software. The Trojan program can
reproduce or replicate like a virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed to perform the repairs, and
employees may lose or have to replace data.
Ransomware is malicious software that infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. This class of malware is a
criminal money making scheme that can be installed through deceptive links in an email
message, instant message or website.
A Spyware is unwanted software that infiltrates your computing device, stealing your
internet usage data and sensitive information. Spyware is classified as a type of malware -
malicious software designed to gain access to or damage your computer, often without your
knowledge.
ACTIVITIES
Directions: Use the internet to identify 5 best antiviruses for PC computers. Draw the
anti-virus logo inside the box and make a short description about its
features.
7
REMEMBER
Most antivirus programs are available for Windows, Unix platforms, and Macintosh but
most antivirus software is made for Windows systems. This is because most hackers target
viruses to computers with Windows systems. Therefore, virus protection like antivirus is very
important for Windows users. If you are a Windows user, you should have at least one antivirus
program installed on your computer, or your smartphone if it also uses Windows system.
Directions. Complete the statement below based on what did you learned from the
lesson. Write your answers on a separate sheet of paper.
POST TEST
Directions: Read each statement carefully. Choose the letter which corresponds to the
correct answer and write your answers on a separate sheet of paper.
1. It is a program that copies itself to hardware, it comes through the network and it
copies itself several times to the device until the machine slows down.
A. Ransomware C. Trojans
B. Metamorphic D. Worm
2. What is the name of the Anti-virus which is being represented by the icon?
A. Avast C. AVG
B. Avira D. Umbrella
8
3. This is a software that's designed to gather data from a computer or other devices and
forward it to a third party without the consent or knowledge of the user.
A. Adware C. Ransomware
B. Spyware D. Malware
4. What is the name of the Anti-virus which is being represented by the icon?
A. Avast
B. Avira
C. AVG
D. Umbrella
5. Why would an identity thief most likely want to steal your information?
A. To be your friend on social media on a tough time and offer support
B. To help with financial problems & difficulties and end your stress
C. To help you with your homework and well organize your assignments
D. To access your bank accounts, credit cards, and other financial resources.
6. Any Anti-virus is a security program you install on your computer to protect it from getting
infected by malware. Which does anti-virus software not do?
A. Delete your files and emails C. Delete malware
B. Scan your computer D. Warn you about dangers
7. The technician is responsible for applying the most recent updates. Why do you need to
update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware
8. Malware is the collective name for a number of malicious software variants. Which is not
a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
9. You can purchase an anti-virus software as a standalone solution, or it is often included
as part of a security package. Which is not a maker of anti-virus software?
A. Spacefiller C. McAfee
B. Bullguard D. Kaspersky
10. It is a malware program that inserts copies of itself into other computer programs,
data files, or the boot sector of the hard drive.
A. Anti-Virus C. Virus
B. BIOS D. Disk Clean up
ANSWER KEY
9
REFERENCES
10