ICF 9 Week 5 6 Docx 2
ICF 9 Week 5 6 Docx 2
ICF 9 Week 5 6 Docx 2
EDUCATION (SPTVE)
ICF 9
Internet and Computing
Fundamentals
Understanding Viruses
MODULE 4 Using the Internet
Week 5 The Risk of Computing
What Is It?
Theft Many steps one can take to protect computer equipment against theft.
Damage Same common sense rules apply as for any other equipment regarding
physical damage.
Data Loss Losing data can occur through hackers, hardware failure, power spikes,
accidental deletions, or disgruntled employees.
Backups Data should be backed up regularly and backup copies stored in another
location.
Power Vulnerable to two kinds of power problems: outages and surges
A power surge is an abnormally high voltage lasting for a short period of time. A power
surge is a transient wave of voltage, current or power in an electrical circuit. ... This is
usually an oversupply of the voltage from a source such as mains supply or generator and
lasting only for a few microseconds.
A power outage is a short- or long-term state of electric power loss in a given area or
section of a power grid. It could affect a single house, building or an entire ...
Power Spike: In electrical engineering terms; power spikes are intense electrical transients
in voltage, current, or transferred energy in an electrical circuit lasting only a few milliseconds
and travelling 16.896 million feet per second. Power spikes can contain very high voltages –
typically 3000 kilowatts. At that speed and intensity, a spike shoots through the average
surge protector long before its resistor has time to melt and stop the current flow.
Spikes are typically caused by: Lightning strikes, Tripped circuit breakers, Short circuits,
Power Line Issues
▪ Use a firewall
Windows 10 and Windows 8 have a firewall already built in and automatically turned on.
▪ Keep all software up to date
Make sure to turn on automatic updates in Windows Update to keep Windows, Microsoft
Office, and other Microsoft applications up to date. Turn on automatic updates for non-
Microsoft software as well, especially browsers, Adobe Acrobat Reader, and other apps you
regularly use.
▪ Use antivirus software and keep it current
If you run Windows 10 or Windows 8, you have Windows Security or Windows Defender
Security Center already installed on your device.
▪ Make sure your passwords are well-chosen and protected
To learn how, see Protect your passwords.
▪ Don’t open suspicious attachments or click unusual links in messages.
They can appear in email, tweets, posts, online ads, messages, or attachments, and
sometimes disguise themselves as known and trusted sources.
▪ Browse the web safely
Avoid visiting sites that offer potentially illicit content. Many of these sites install malware on
the fly or offer downloads that contain malware. Use a modern browser like Microsoft Edge,
which can help block malicious websites and prevent malicious code from running on your
computer.
▪ Stay away from pirated material
Avoid streaming or downloading movies, music, books, or applications that do not come from
trusted sources. They may contain malware.
▪ Do not use USBs or other external devices unless you own them
To avoid infection by malware and viruses, ensure that all external devices either belong to
you or come from a reliable source.
Windows Security
Windows Security (or Windows Defender Security Center in previous versions of Windows
10) is built in to Windows 10 and Windows 8 and provides real-time malware detection,
prevention, and removal with cloud-delivered protection. It is intended for home, small
business, and enterprise customers.
Using Ergonomics
Ergonomics, or human factor engineering, is the study of the human in the workplace
Studies identified three particular areas of concern:
– In wrist, all nerves and blood vessels pass through narrow tunnel in wrist bones
called carpal tunnel; repeated stress in this area causes painful inflammation
(carpal tunnel syndrome), or repetitive motion injury (RMI)
– A similar situation can arise at elbow joint
– Sitting for extended periods on incorrect seating constricts blood flow in legs
and applies pressure on nerves
Using Ergonomics
Looking at Workstation Ergonomics
1. Monitor and keyboard should be straight in front of you.
2. No glare or reflections on screen.
3. Place any documents in document holder next to monitor.
4. Work surface should be stable.
5. Once seated comfortably, wrists should be straight and flat.
What I Can Do ?
Activity 1: Read and identify the correct answer for each statement below:
Activity 2: True or False: Write word True if the statement is correct and False if otherwise.
Multiple Choice: Read the sentences below and write the correct letter of your choice.
Use a separate paper for your answer.
1. Among the given answers, which one is not the purpose of a Hacker.
A. steal information to sell C. change information
B. destroy information D. ignore the information
2. To avoid eye strain proper lighting is important. Which one is best to observe?
A. Work at midnight with full lightings. C. Natural light is always better.
B. Lighting should be above or behind you. D. Always dim your monitor lightings.
3. Top of monitor should be about ________above eyes.
A. 1-2 “ B. 2-3” C. 3-4” D. 4-5”
4. An intense electrical transients in voltage, current, or transferred energy in an electrical
circuit. What power is referred to?
A. Outage B. Spark C. Spike D. Surge
5. Jorge is accessing office information without asking permission. What do you call him?
A. Hacker B. Surfer C. Stealer D. Worker
6. To avoid muscle stress and body pain while working with the use of computer one should
consider proper human factor engineering. Which of following should be practiced.
A. Tolerate a glare or reflections on screen.
B. Feet should be lifted on floor when seated .
C. Once seated comfortably, wrists should be straight and flat
D. Insufficient lighting should be above or behind you, facing onto monitor.
7. Eliminating theft is a major problem to do, one way to protect your laptop and your
software is to:
A. Purchase insurance protection.
B. Increase building security.
C. Padlock computers to desks/per location.
D. Use password to prevent access to software.
8. It consists of code developed by cyber attackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a network.
A. Browser B. Cookies C. Malware D. Scam
9. To effectively protect your system and data, one must adhere to safety tips except for:
A. Use a firewall C. Use antivirus software and keep it current
B. Stay away from pirated material D. Open suspicious attachments or unusual
links in messages.
10. Important technique to protect data is with passwords. What a strong password should
be made of?
A. birthday date C. obvious nickname
B. letter and numbers D. complicated casing
REFERENCE
ICF 9 MODULE – LIVING ONLINE
www.google.com
MODULE 4 Looking at the Internet
TOPIC 6 Understanding Viruses
What Is It?
A computer virus is a type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. If this replication succeeds, the affected areas are then said
to be "infected" with a computer virus. Computer viruses generally require a host program.
Damage is due to causing system failure, corrupting data, wasting computer resources, increasing
maintenance costs or stealing personal information. Even though no antivirus software can uncover all
computer viruses (especially new ones), computer security researchers are actively searching for new ways
to enable antivirus solutions to more effectively detect emerging viruses, before they become widely
distributed.
2 Phases of Virus
1, Infection phase – the virus cling to infect files and programs
2, Attack phase – in its way for destruction
Understanding Viruses
Only one way virus can infect compute— you let it in!
1. File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host files
and others can damage your hard drive’s formatting.
2. Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
4. Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code on
a website and insert links that can install malicious software on your device. Web scripting
viruses can steal your cookies and use the information to post on your behalf on the infected
website.
5. Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks. Today,
these viruses are found distributed in forms of physical media such as external hard drives or
USB. If the computer is infected with a boot sector virus, it automatically loads into the
memory enabling control of your computer.
6. Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
7. Resident Virus
A resident virus stores itself on your computer’s memory which allows it to infect files on your
computer. This virus can interfere with your operating system leading to file and program
corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily spread on your computer system. It can
infect multiple parts of a system including memory, files, and boot sector which makes it
difficult to contain.
Some other malicious viruses that exist, although not actually a virus
Two most common types are:
Worms - virus programs that duplicate or replicate themselves through some
means
Trojan Horses - written to be “hidden” and appear harmless
Manifestations of a Virus
on the system
See messages,
prompts, or displays
never saw before
Computer seems to
run lot slower or
problems with
programs suddenly
appear
Certain software
applications no
longer work
Hear sounds or
music never heard
before and occur
randomly
Names of disk,
volumes, or files changed
Computer seems to contain lot more or less files than before
See lot of error messages indicating file is missing
Get messages with attachments from people you don’t know
Data can be lost as result of power problems, computer breakdown, theft or hacking
Backup is when you save your data elsewhere as well as regular folder or hard drive.
What I Can Do ?
Activity 1: Identify the sentences if it is a manifestations of virus existence. Pick out the correct
answer by writing its letter.
1. A type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code.
A. Browser B. Spam C. Scam D. Virus
2. This virus can interfere with your operating system leading to file and program corruption.
A. Boot Sector B. Multipartite C. Resident D. Worms
3. A type of virus that is very infectious and can easily spread on your computer system.
A. Boot Sector B. Multipartite C. Resident D. Worms
5. It is also called a parasitic virus which typically infects files with .exe or .com extensions.
A. File B. Multipartite C. Resident D. Trojan
7. Data can be lost as result of power problems, computer breakdown, theft or hacking, to
avoid these, one should have a ___________.
A. Anti-virus B. Back-up C. File cabinet D. RAM Storage
9. Has the capability to evade anti-virus programs since it can change codes every time an
infected file is performed.
A. Polymorphic B. Multipartite C. File D. Boot sector
10. It is the stage wherein virus are kept on attaching from one file to another.
A. Attack B. Execution C. Infection D. Propagation
REFERENCE
ICF 9 MODULE – LIVING ONLINE
google.com/ Wikipedia.com
www.nibusinessinfo.com
KEY ANSWER
Week 5
Activity 1:
1. Hacker
2. Power outage
3. Ergonomics
4. Power surge
5. Phishing scam
Activity 2:
1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE
Assessment
1. D 6. C
2. C 7. D
3. B 8. C
4. D 9. D
5. A 10. B
Week 6
Activity 1: A,B,D,E,F,G
Assessment:
1. D
2. C
3. B
4. A
5. A
6. A
7. B
8. A
9. A
10. C