KEMBAR78
ICT10 ModuleQ4 | PDF | Graphical User Interfaces | Operating System
0% found this document useful (0 votes)
22 views25 pages

ICT10 ModuleQ4

MODULE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views25 pages

ICT10 ModuleQ4

MODULE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

SAINT TERESA ACADEMY INC.

Catagbacan Norte, Loon, Bohol


Email: sta.catagbacan@yahoo.com
Tel: (038) 505-8006
Member: CATHOLIC EDUCATIONAL ASSOCIATION OF THE PHILIPPINES (CEAP)
BOHOL ASSOCIATION OF CATHOLIC SCHOOLS (TAGBILARAN)
Unit 4: SOFTWARE AND OPERATING SYSTEM
Lesson 4.1: SOFTWARE
Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
The term “software” was coined in 1958 by John Tukey. It is the language in which a
computer speaks. Software refers to the collection of program and documentation that
performs different tasks on a computer. Without software, hardware is literally useless.
Computer hardware only acts upon the instruction given to it. Software not only tells the
computer how to manage its resources, it also allows for the development of a computer
system that is suited to the needs of a user.
Software Fundamental
Software is composed of programs or a sequence of instructions and data processed by
the programs. Software uses the stored program concept in which stored software
program are accessed and their instructions are executed in the processor. When the
program has finished execution, a new one will be loaded into the memory and the
hardware addresses another task. Software also consists of documentation, which is a
written description of the functions of the program. Documentation should be provided
whenever new software is released. This written description teaches a user how the
software is used and its functions. It also serves as a reference guide for programmers
when it is necessary to upgrade the software. Moreover, it can be evidence of ownership
for the software.
Types of Software
1. Systems Software
System software is the interface between the computer hardware and applications that
can be directly manipulated by a programmer.
 Provides essential functions for computer systems such as managing hardware
resources.
 Supplies the sets of instructions commonly used by applications.
 Controls and supports the computer system and information processing
activities.
 Manages the programming, testing and debugging of computer programs.
 Systems software has two major functional categories:
a. System Control Programs- manage the use of the hardware, software and data
resources of a computer system. The operating system (OS) is the primary
system control program which facilities the overall operations of the computer.
The OS also allocates CPU time and memory to applications running on the
computer. The operating system is the interface between the hardware and the
user.
b. System Support Program- provides different support services that help the
operations, management, and users of the computer system. System utility
software, performance monitor, and security monitors are some examples of
system support programs.
2. Application Software
Application software is used to accomplish a specific task. A task may be broad, such a
general word processing or narrow, such as a payroll program. Applications software is
mainly used to manipulate data in order to produce or provide information. The

1
systems software available on a computer system provides the capabilities and the
limitations within which an applications software can operate.

Types of Application Software


 Spreadsheets are used for financial information like a balance statement or
cash flow analysis. Spreadsheets consist of a grid of rows and columns called
cells wherein users can enter numbers or text. A formula can be inserted into a
cell to calculate for its result which is displayed in that cell’s location. Users can
also develop and use macros which are a series of commands executed with
just one instruction.
 Data Management Software helps the manipulation, Storage, and retrieval of
related data. Data management software has two types: simple filing programs,
which are simple and fast to use but offers limited flexibility in how data can be
searched, and database management software that takes advantage of the
computer’s fast and accurate ability to store and retrieve data in primary and
secondary storages.
 Word Processing Software enables the manipulation of text. Modern word
processors provide several productive writings and editing features. Word
processors consists of a text editor, formatting program, print program,
dictionary, thesaurus, grammar checker, mailing list program, and integrated
graphics, charting and drawing programs. This type of application software
applies the What You See Is What You Get (WYSIWYG) concept.
 Desktop Publishing Software makes possible the creation of specialized
documents using computers. Examples specialized of documents include
newsletters, announcements, and advertising copy that are usually created in
typeset.
 Graphics Software can be used to manipulate visual images with the aid of a
computer. Computer graphics can be grouped into two categories: raster
graphics, which represent an image as rectangular grid of pixels, or points of
color, viewable via a monitor, on paper, or other display mediums, and vector
graphics that use geometric figures such as points, lines, curves, and shapes or
polygons to represent images.
 Presentation Software enables users to create rich presentations for public
viewing such as for seminars, classrooms, meetings, and any other special
occasions. Also known as presentation graphics, this type of software has large
libraries of clip art images that can be pasted onto slides.
 Computer-Aided Design (CAD) Software allows user to design items for
manufacturing and production. CAD enables designers to build prototypes and
test them as computer objects.
 Multimedia Software is the mixture of spatial-based media consisting of text
and images with time-based media composed of audio and video. Multimedia
software combines at least two media for input or output. Multimedia is the
combination of text, graphics, audio, video, and animation.
 Communications Software allow the exchange of data among computers over
dedicated or public cables, telephone lines, satellite relay systems, or
microwave circuits. Internet, E-mail and video conferencing rely on
communications software.
 Speech or Voice Recognition Software is the ability of a machine or program to
receive and interpret dictation or to understand and carry out spoken
commands. Speech recognition software is typically used when it is impractical
to use a mouse or a keyboard like for users with physical disabilities, repetitive
strain injuries, or severe arthritics.
 Educational Software is intended mainly for teaching/instruction. Courseware,
the combination of course and software, is a kind of educational software that
describes additional materials provided for teachers or trainers to serve as
tutorials for students.

3. Programming Software
Programming software is a tool used by programmers to build computer programs. It
involves the use of a text editor, interpreter and compiler. To date, programming
software has am Integrated Development Environment (IDE) that enables a
programmer to build programs visually. Examples of programming Software are Visual
Basic, C/C++, and Java.
2
4. Malware
Malware are software that can threaten computer security. Viruses and worms
replicate themselves and attack computer software. An example of malware is the
trojan horse that at first may seem to be a helpful program but it actually steals
information. Spyware monitors user’s activity without their knowledge.

5. Adware
Adware is a tool that can be used to generate revenue. It extracts user information
especially about the Websites frequently visited by a user. It is usually a pop-up that
appears on screen containing an advertisement.

Types of Software Licensing


Software licensing decides how software can be accessed and used. The end user’s rights
to copy, modify, and redistribute software will depend on the software license.
1. Custom software
This refers to software developed for a specific user or organization. It is called custom
software. Its specifications are defined by a user’s requirements.
2. Off-the-shelf Software
Off-the-shelf Software is not specifically designed to the needs of a specific user or
organization. It has predefined specifications that may or may not cater to the
requirements of any specific user. It comes with a license agreement that a user should
agree with.
3. Free Software
Free Software is free to use, modify, and distribute
4. Open-Source Software and Closed Source Software
Source codes for open-source software are open to change, to improvement, and
distribution to the public. The source codes for closed source software is exclusively
available only to an individual or organization.
5. Proprietary Software
The legal rights for this type of software licensing remains exclusive with the copyright
holder. It is also called closed-source software.
6. Shareware and Retail Software
Shareware software is offered as a trial version to users while retail software is sold to
end users.

Worksheet 4.1
IDENTIFICATION:

_____________1. Enables users to create rich presentations that can be used for seminars,
classrooms, meetings, and other special occasions.
_____________2. It is standard software that is not specifically designed to a user’s or an
organization’s needs.
_____________3. Personality who coined the term “Software” in 1958.
_____________4. Software that is used to accomplish a specific task.
_____________5. It represents an image as a rectangular grid of pixels, or points of color,
viewable via a monitor, paper, or other display medium.
_____________6. The ability of a machine or program to receive an interpret dictation or to
understand and carry out spoken commands.
_____________7. Software developed for a specific user or organization.
_____________8. It is the interface between the computer hardware and applications that
can be directly manipulated by a programmer.
_____________9. It is the combination of text, graphics, audio, and animation.
_____________10. It provides different support services that help the operations,
management, and users of the computer system.

Lesson 4.2: Operating System

Most Essential Learning Competencies:


Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
3
Values : Fortitude, Meekness, Industry
Concept
The operating system manages all the tasks of the computer system. The OS assigns CPU
time and memory addresses to programs running on the computer and gives an interface
between the hardware and the computer user.

Common Operating Systems Tasks


The following tasks are commonly performed by an operating system;
 Monitor computer performance
 Correct error
 Provide and maintain the user interface
 Boot the computer
 Read the programs into the memory
 Manage allocation of memory addresses to programs
 Put files and programs in secondary storage
 Create and maintain directories
 Format diskettes
 Control computer monitor
 Send jobs to the printer
 Maintain security and limit access
 Locate files
 Detect viruses
 Compress data

Process Management
Process management is the supervision of programs or jobs running on the CPU at a
certain time. The operating system loads a program into the main memory for execution.
Operating systems may feature advanced forms of process management.
 Multitasking – Also called multiprogramming, is the capability of the operating
system to run two or more programs or tasks on the computer system.
 Multithreading - A type of multitasking that runs multiple tasks within a single
program simultaneously.
 Time-sharing – An additional to multiprogramming where several users operate
a computer system with one processor but using different terminals.
 Multiprocessing – This happens when a computer system with several CPUs
execute several programs or threads by assigning the programs or threads to
different CPUs
 Virtual Memory – Permits an application to act as if it has access o the full
storage capacity of a computer system, rather than just access to the size of
main storage installed on the computer system. It virtually enlarges the
capacity of the primary storage and increases the speed of the computer.
 Fault Tolerance – It is the capability of a computer system to give the correct
output and to keep operating even after an error or a fault occurs. It involves
error-correcting memory, recurring computer components and related software
that secures the system from operating system, user, or hardware errors.

Types of Operating Systems


1. Mobile Device Operating Systems
Mobile device operating system are customized to run on mobile devices such as
tablet computers, mobile phones, mp3 players, handheld computers, set-top boxes,
subnotebook PCs, and factory floor equipment.

OS IMAGE DESCRIPTION
NAME
Android A free Linux based OS for touchscreen mobile
devices such as smartphones and tablet
computers. Initially developed by Android, Inc.,
which google financed and eventually bought.
iOS Apple’s proprietary operating system for iPhone,
iPod Touch, iPad and Apple TV.
BlackBerry A proprietary mobile OS by BlackBerry Ltd. It is
OS the predecessor of the BlackBerry 10 mobile OS.
BlackBerry10 A proprietary mobile OS for BlackBerry
smartphones and tablets.
4
Windows Series of proprietary mobile operating systems
phone developed by Microsoft. The successor to the
windows Mobile platform.
Windows RT A variant of the windows 8 operating system for
mobile devices.
Windows A family of mobile OS developed by Microsoft for
Mobile Smartphones and Pocket PCs. Windows Mobile is
the predecessor of windows Phone.
Bada An operating system developed by Samsung
Electronics for mobile devices such as
smartphones and tablet computers.
Symbian OS A mobile operating system and computing
platform designed for smartphones. It is currently
maintained by Accenture but was originally
developed by Symbian Ltd.
Aliyun OS A Linux distribution designed for smartphones and
developed by AliCloud, a subsidiary of the Chinese
company, Alibaba Group. Aliyun OS is also known
as Yun OS.
Firefox OS A Linux based open source operating system
developed by Mozilla for Smartphones and tablet
computers.
Ubuntu A mobile interface for Ubuntu developed by
Touch Canonical Ltd. It was designed primarily for
touchscreen mobile devices such as smartphones
and Tablet computers.
Nokia Asha A mobile OS and computing platform designed for
low-end, borderline smartphones.
Palm OS A mobile operating systems, initially developed by
Palm, Inc., for personal digital assistant (PDAs).
Palm OS is also known as Garnet OS.
Sailfish OS Linux-based mobile operating system developed
by Jolla in cooperation with the Mer project and
supported by the Sailfish Alliance.
GridOS GridOS was built by Fusion Garage using open
source code from the Android kernel. It is the
operating system of the Grid 4 mobile phone and
Grid 10 tablet.
Mer project Mer is a division of MeeGo. I T is an open, mobile-
optimized, core distribution aimed at device
manufacturers.
Brew BREW stands for Binary Runtime Environment for
Wireless. It is an application development platform
created by Qualcomm, originally for CDMA (Code
Division Multiple Access) mobile phones.
SHR SHR stands for Stable Hybrid Release. It is a
community-driven Linux distribution for
smartphones which is based on Open Embedded
and the FSO framework.
webOS A mobile operating system based on a Linux
kernel that was initially developed by Palm. It was
later acquired by Hewlettpackard then by LG
Electronics.
Tizen An open source operating system for
Smartphones, tablets, in-vehicle infotainment
(IVI)devices, and smart TVs.
Limo4 An open source, hardware-independent, Linux
based mobile operating system for smartphones
device. It is from the LiMo Foundation, a non-profit
technology consortium organization.
Maemo A software platform, based on the Debian Linux
distribution, for smartphones and tablets.
MeeGo A Linux based free mobile operating system
designed for hardware platforms such as
5
netbooks, entry-level desktops, nettops, tablet
computers, mobile computing and
communications devices, in- vehicle infotainment
devices, Smart TV / Connected TV,IPTV-boxes,
smartphones, and other embedded systems.
Nucleus Areal-time operating system (RTOS) and toolset
RTOS created by the Embedded Systems Division of
Mentor Graphics. It is designed for embedded
system applications including consumer
electronics, set-top boxes , cellular phones, and
other portable and handheld devices.

2. Desktop and Laptop Operating System


Desktop operating system are customized for use by a single user or a small workgroup
of users using PCs and Laptops.

Microsoft Windows OS for Desktop and Laptop Computers


NAME RELEASE LOGO EDITIONS
DATE
Windows 10 TBA 2015  TBA
Windows 8.1 18 October 2013  Windows 8.1
Pro
 Windows 8.1
Pro
 Windows 8.1
 Enterprise
Windows 8 26 October 2012  Windows 8
 Windows 8
Pro
 Windows 8
Enterprise
Windows 7 22 October 2009  Windows 7
Home
Basic
 Windows 7
Home
Premium
 Windows 7
Professional
 Windows 7
Enterprise
 Windows 7
Ultimate
 Windows
Thin PC
Windows Vista 30 January 2007  Windows
Vista Home
Premium
 Windows
Vista
Business
 Windows
Vista
Enterprise
 Windows
Vista
Ultimate
Windows XP 25 October 2001  Windows XP
Starter
 Windows XP
Home
 Windows XP
Professional
 Windows XP
64-bit Edition
6
 Windows
Fundamental
s for Legacy
PCs (8 July
2006)
Windows ME 14 September N/A
2000
Windows 2000 17 February 2000 Professional
Windows 98 25 June 1998  Windows 98
 Windows 98
Second
Edition (23 April
1999
Windows NT 4.0 24 August 1996 Windows NT 4.0
Workstation
Windows 95 24 August 1995  Windows 95
 Windows 95
SP1 (31
December
1995)
 Windows 95
OSR1 (14
February
1996)
 Windows 95
USB
Supplement
to OSR2 (27
August 1997)
 Windows 95
OSR2.1 (27
August 1997)
 Windows 95
OSR2.5 (26
November
1997)

Mac OS X Versions
VERSION CODENAME LOGO RELEASE DATE
OS X 10.10 Yosemite October 16,2014
OS X 10.9 Mavericks October 22,2013
OS X 10.8 Mountain Lion July 25, 2012
Mac OS X 10.7 Lion July 20,2011
Mac OS X 10.6 Snow Leopard August 28, 2009
Mac OS X 10.5 Leopard October 26,2007
Mav OS X 10.4 Tiger April 29,2007
Mac OS X 10.3 Panther October 24,2003
Mac OS X 10.2 Jaguar August 24,2002
Mac OS X 10.1 Puma September
25,2001
Mac OS X 10.0 Cheetah March 24, 2001
Public Beta Kodiak September
13,2000

Popular Linux Operating System


DISTRIBUTION FOUNDER LOGO RELEASE DATE
Arch Linux Judd Vinet 2002-03-11
Bodhi Linux Bodhi Linux Team 2013-09-13
Chakra Jan Mette and Arch
Linux KDE mod
developers
Crunch Bang Linux Philip Newborough 2013-05-06
Debian Ian Murdock 2014-07-12
Elementary OS Daniel Fore 2013-08-10
7
Fedora Fedora Project 2013-12-17
Freespire Lindows.com, Inc. 2006-27-28
Gentoo Linux Daniel Robbins 2002-03-31
Korora Christ Smart 2014-01-10
Kubuntu Canonical Ltd. 2014-04-17
Linux Mint Clement Lefebvre 2014-05-31
Mageia Mageia 2011-06-01
Community
Mandriva Linux Mandrakesoft S.A. 1998-07-23
MEPIS Warren WoodFord 2003-05-10
Netrunner Blue Systems 2010-03-18
openSUSE SUSE Linux, Novell 2013-11-19
Pardus Scientific and 2004-09-14
Technological
Research Council
of Turkey
(TUBITAK)
Parsix Alan baghumian 2007-06-17
PC Linux OS Bill Reynolds 2003 October
Sabayon Linux Ixnay Design 2005-11-28
Salix OS Cyrille Pontvieux, 2009-09-16
George Vlahavas,
Pierreck Le Brun,
Thorsten
Mulhfelder
Slackware Patrick Volkerding 2013-11-07
SolydXK Arjen Balfoort 2013-02-28
Source Mage Ryan Abrams, Eric 2002-10-31
GNU/Linux Schabell
Trisquel GNU/ Ruben Rodriguez 2014-11-03
Linux Perez (quidam)
Ubuntu Canonical Ltd. 2014 -04-17
Ubuntu GNOME Canonical Ltd. 2014-04-17
Ututo Diego Savaria, 2012-04-27
Daniel Olivera
Vector Linux Robert S. Lange 2000-06-28
Xubuntu Canonical Ltd. 2014-04-17
Zenwalk Jean-Philippine 2004-05-21
Guillemin

3. Departmental Server Operating Systems


Departmental Operating Systems have robust scalability, backup, reliability, security,
fault tolerance, multiprocessing, multitasking, Internet Integration, network
Management, and directory services. They support a few dozen to a few hundred users.
SMALL BUSINESS SERVER LOGO
Window Small Business Server 2008
Windows Small Business Server 2011
Mac OS X Server
FreeBSD
Solaris
CentOS
ClearOS
Ubuntu Server

4. Enterprise Server Operating System


Enterprise Operating Systems normally run on mainframes. They provide a higher level
of security, stability, manageability, and support for multiple users, online applications,
secure E-commerce, large databases, and millions of transactions per day. They
support thousands of simultaneous user and billions of simultaneous transactions.

MAINFRAME OPERATING SYSTEM LOGO


SLES (SUSE Linux Enterprise Server)
RHEL (Red Hat Enterprise Linux)
8
z/OS
Oracle Linux
Asianux
Microsoft Windows Server 2008 R2
Windows Server 2012 R2

Supercomputer Operating System


Supercomputer operating system manage highly parallel multiprocessor and multiuser
environments.
SUPERCOMPUTER OPERATING LOGO
SYSTEM
Kylin Linux
Cray Linux Environment (CLE)
Linux
RHEL (Red Hat Enterprise Linux)
AIX (Advanced Interactive
eXecutive)
Windows HPC Server 2008 R2

Worksheet 4.2
Matching type
Match the item in Column A with Column B. Write the letter of the correct answer on the
space provided before each number.

COLUMN A
COLUMN B

______ 1. Apple’s proprietary OS for iPhone, iPod Touch, a. GUI


iPad, and Apple TV b. Firefox OS
______ 2. Operating Systems that manage highly parallel c. Multitasking
multiprocessor and multiuser environments. d. Time Sharing
______ 3. Proprietary mobile OS for Blackberry smartphones e. Virtual Memory
and tablets f.
Multithreading
______ 4. It manages all the operations of the computer system g. Operating
System
______ 5. It runs multiple tasks within a single program h. Blackberry 10
Simultaneously i.
Supercomputer
______ 6. It virtually enlarges the capacity of the primary storage j. iOS
And increase the speed of the computer
______ 7. Several users operate a computer system with one
Processor
______ 8. Runs two or more programs or tasks on the computer
System
______ 9. Developed by Mozilla for smartphones and tablet
Computers
______ 10. It enables computer users to use icons and the mouse

Lesson 4.3: User Interface


Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
Interface is the medium of communication between two different entitles. In the field of
human machine interaction (HMI), user interface is the tool used by humans to interact
with machines. The purpose of this communications is the effective manipulation and
control of a machine on the part of the user and the reaction from the machine to help the
user generate practical decisions.
9
Characteristics of the User Interface:
 Clarity- The user interface prevent ambiguity by making everything clear
through the use of language, flow, hierarchy, and symbols for visual aspects.
 Concision- Making the interface clear is easy by labeling everything. But the
interface would be overcrowded thus becoming tiresome to use. The most
challenging part in designing a user interface is how to make it concise and at
the same time.
 Familiarity- Even if a user uses an interface for the first time, certain elements
are familiar. Real-life symbols can be used to convey meaning.
 Responsiveness- A user interface should not be dull. The interface should give
a good reaction to the user about what occurs and if the user’s input is
successfully processed.
 Consistency- Keeping the user interface consistent across and applications
enables users to recognize usage pattern.
 Aesthetics- Making the user interface attractive will make the users enjoy the
interface more while using it.
 Efficiency- The user interface should make the user more productive through
the use of shortcuts and design.
 Forgiveness- The user interface should not penalize users for their errors but
rather give them the means to remedy it.
Principle of Least Astonishment (POLA)
POLA is the basic principle in designing all kinds of interfaces. This principle originated
from the idea that human beings can only pay full attention to one thing and one time,
thus resulting to the conclusion that unfamiliarity should be reduced.

Types of User Interface


1. Command line Interface (CLI)- makes it possible for the computer user to communicate
with the computer system by way of typing commands into a screen. CLI is a text-
based interface used to control operating systems thus enabling the user to react to
visual prompts by entering commands into the interface and receiving a reply in a
similar manner.

CLI operation is relatively easy but not user-friendly. Modern computers still support
the CLI, especially those who use Windows OS. CLI features a command prompt that
involves a series of characters and notifies users that the CLI is ready to accept
commands.

 MS-DOS (Microsoft Disk Operating System)- Developed for IBM compatible PCs.
It was originally written by Tim Patterson and released to the public by Microsoft
in 1981. MS-DOS was last updated in 1994, but its command prompt shell is still
used today especially for troubleshooting the PC. Just type cmd in the Start
menu and press Enter to open the command shell.
COMMAND DESCRIPTION
attrib Display and change file attributes
Batch Recovery console command that executes a series of command in
a file
bcdedit Modifies the boot configuration data store
break Enables and disables the CTRL + C feature
cd Changes Directories
chkdsk Check the hard drive running NTFS for errors
cls Clears the screen
Cmd Opens the command interpreter
Color Changes the foreground and background color of the MS-DOS
window
command Opens the command interpreter
control Opens control panel icons from the MS-DOS prompt
Convert Covert FAT and NTFS
copy Copies or more files to an alternate location
date Views or changes the system’s date
defrag Rearranges the hard drive to help with loading programs
del Deletes on or more files
dir Lists the content of one or more directory
disable Recovery console command that disables Windows system sevices

10
or drivers
diskcopy Copies the content of one disk and place them on another disk
Echo Displays messages and enables and disables echo
edit Views and edit files
erase Erases files from the computer
Exit Exits from the command interpreter
fdisk Utility used to create partitions on the hard drive
For Boolean used in batch files
format Command to erase and prepare a disk drive
goto Moves a batch file to a specific label or location
help Displays a listing of commands and a brief explanation
if Allows for batch files to perform conditional processing
ipconfig Network command to view network adapter settings and assigned
values
label Changes the label of a disk drive
md Command to create a new directory
mem Displays memory on system
mode Modifies the port or display setting
more Displays one page at a time
move Moves one or more files from one directory to another directory
net Updates, fixes, or views the network or network settings
netsh Configures dynamic and static network information from MS-DOS
netstat Display the TCP/IP network protocol statistics and information
nslookup Looks up an IP address of a domain or host on a network
path Views and modifies the computer’s path location.
pathping Views and locates location of network latency
pause Command used in batch files to stop the processing of a command
ping Tests and sends information to another network computer or
network device
Print Prints data to a printer port
rd Removes an empty directory
rename Renames a file or directory
route Views and configures Windows network route tables
shift Changes the position of replaceable parameters in a batch
program
shutdown Shuts down the computer from the MS-DOS prompt
sort Sorts the input and displays the output to the screen
time Views or modifies the system time
title Changes the title of their MS-DOS window
tracert Visually displays a network packet’s route across a network.
tree Views a visual tree of the hard drive
Type Displays the contents of a life
undelete Restores a file that was deleted
unformat Unformats a hard drive
ver Displays information about the version
vol Displays the volume information about the designated drive
xcopy Copies multiple files, directories, or drives from one location to
another

 UNIX – an operating system developed at bell laboratories in the late 1960’s.


The term, UNIX, was coined by Brian Kernighan. The development of UNIX does
not only involve programmers but also organizations, institutions, and
individuals who contributed important additions to make in a popular operating
system. UNIX is the backbone of LINUX OS and most of its variants.
These commands allow the user to create directories and handle files.
COMMAND DESCRIPTION
cat Displays file content
cd Changes directory
chgrp Changes file group
chmod Changes permissions on a file or directory
cp Copies source file into destination
file Determines file type
find Use to find files
11
grep Searches file for regular expression
head Displays first few lines of a file
In Creates a softlink on oldname
Is Displays information about a file type
mkdir Creates a new directory
more Displays data in paginated form
mv Moves (renames)an old name to a new name
Pwd Prints current working directory
rm Removes (deletes) filename
rmdir Deletes an existing directory provided it is empty
tail Prints the last few lines in a file.
touch Updates access and modification time of a life

The content of files can be compared and altered with the following commands.
COMMAND DESCRIPTION
awk Pattern scanning and processing language
cmp Compares the content of two files
comm Compares sorted data
cut Cuts out selected fields of each line of a file
diff Differential file comparator
expand Expands tabs to spaces
join Joins file on some common field
perl Data manipulation language
sed Stream text editor
sort Sort file data
split Splits file into smaller files
tr Translates character
uniq Reports repeated lines in a life
wc Counts word, lines, and characters
vi Opens vi text editor
vim Opens vim text editor
fmt Simple text formatter
Spell Checks text for spelling error
ispell Checks text for spelling error
emacs GNU project Emacs
Ex, edit Line editor
emacs GNU project Emacs

2.Graphical User Interface (GUI)-The most common type of user interface today. It uses
pictures, graphics and icons. GUI is also known as WIMP (Windows, Icons, Mouse, and
pointers). Most applications run in GUI are known as WYSIWYG (What You See is What You
Get). GUI tries to make sure that whatever displayed on the screen will be printed the way
it looks on the screen.

Command Line Vs GUI


The following table shows the advantages and disadvantages of CLI and GUI.
TOPIC CLI GUI
Ease Because of the Although new users may
memorization and have a difficult time
familiarity needed to use a learning to use the
command line interface. mouse and all the
New users have a hard features of GUI, most
time navigating and users learn this
working a command line interface easily when
interface. compared to a
command line interface.
Control Users have more control of Although a GUI offers
the file system and plenty of control over a
operating systemin a file system and
command line interface. operating system, the
For example, users can more advanced tasks
copy a specific file from may still require the use
one location to another of a command line.

12
with a one-line command.
Multitasking Although many command GUI users have windows
line environment are that enable a user to
capable of multitasking, view, control and
they do not offer the same manipulate multiple
ease and ability to view things at once and are
multiple things at once in faster to navigate when
one screen. compared to a
command line.
Speed Command line users only A GUI may be easier to
need to use their be use because of the
keyboards to navigate a mouse, However, using
command line interface a mouse and keyboard
and often only need to to navigate and control
execute a few lines to the Operating system
perform a task. for many things is
slower than someone
who knows how to work
in a command line.
Resources A computer that only uses A GUI requires more
the command line takes up system resources
less of the computer’s because each of the
system resources than a elements such as icons,
GUI fonts, etc. need to be
loaded. In addition,
video drivers, mouse
drivers, and other
drivers that need to be
loaded also take up
additional system
resources.
Scripting A command line interface Although a GUI enables
enables a user to script a a user to create
sequence of commands to shortcuts, tasks, or
perform a task or execute other similar actions, it
a program. does not come close in
comparison to what is
available through the
use of a command line.
Remote Access When accessing another Although remote
computer or networking graphical access is
device over a network, a possible , not all
user can only manipulate computers and
the device or its files using especially not all
a command line interface. network equipment
have this ability.
Diverse Learning how to navigate Each GUI has a different
and use a command line, design and structure for
does not differ much with a performing different
new GUI. Because though tasks. Even different
new commands may be versions of the same
introduced, the original GUI, such as windows,
commands are the same. can have hundreds of
variations between each
version.
Strain The command line allows Although shortcut keys
the user to keep their can be learned to help
hands on the keyboard and reduce movement from
rarely have to move from the keyboard to the
the keyboard to the mouse, there is still a lot
mouse. Moving back and of movement needed to
forth between a keyboard switch between the
and mouse can cause keyboard and mouse
strain. when using a GUI.

13
Worksheet 4.3
1.Complete the table below:
TOPIC CLI GUI
Ease
Control
Speed
Resources
Strain

2. Answer the following based on your answers in the preceding table.


a. Which is more advantageous to use, CLI OR GUI? Why?
b. Which interface do you prefer? Explain.

Lesson 4.4: File System (FS)


Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
File system is the process of organizing and retrieving files from storage devices such as a
flash drive or hard drive. A file system is normally composed of files divided into groups
called directories. Without a file system, files would no be organized and it would not be
possible for a file with the same name to exist. Generally, files are arranged in hierarchical
fashion that enables a user to view all files in the current directory and then go to
subdirectory and back to the previous directory. Directions are called folders in GUI.

To know what are the file systems of storage devices installed on a computer system, type
disk management on the start menu then click Create and format hard disk
partitions.

The Disk Management window will appear to display available storage devices, their
respective sizes, free space available, and file systems.

All digital files are stored on storage devices with a particular size. Storage devices are a
series of virtual boxes for reading or both reading and writing digital data. Groups of bytes
of data in storage will have its own location called address. Storage can be represented
as a grid with a set of numbered cells. Normally, computer storages utilize a pair of sector
and in-sector offset to reference any byte of data on the storage device.

A sector is a group of bytes that is the minimum addressable unit of the physical storage.
This system is used to maximize storage addressing and uses a smaller number to
reference any part of data on the storage. Each file is saved to unused sectors and can be
read by known location and size.

File System
A file system is an organized data model and a group of metadata that describe the stored
data. A file system not only functions to organize the whole storage but also to be part of
disk partition, which is a unique storage portion of a storage device. Normally, a file
system operates blocks, not sectors. File system blocks are set of sectors that maximize
storage addressing. Modern file systems normally use block sizes 1 up to 128 sectors.

Files are usually stored from the beginning of a block and takes all blocks. Massive write/
delete operations to a file system can result to file system fragmentation, which causes
parts of a file to be stored separately to different blocks far away from each other.
Fragmentation can slow down the normal speed of a computer system. Defragmentation is
necessary to consolidate parts of files that are fragmented. To meet various requirements
regarding storage performance, stability and reliability, different file systems are
developed to serve certain computer user purposes.

Windows File System

14
1. File allocation Table (FAT)- a system of monitoring the content of storage devices that was
used by older Microsoft operating systems such as DOS. The table in FAT is a chart of
numbers that refer to group or cluster addresses on the storage device.
 FAT8-oldest type of FAT used on 8-inch floppy disk
 FAT12-used a 12-bit binary system inherited from FAT8; it was used on 3.25
floppy diskettes and small volume hard drives; a storage device using FAT12
can have a maximum of 16,736,256 bytes or 16MB; FAT12 is now obsolete.
 FAT16-used a 16-bit binary system; it was utilized for windows 3.1 to windows
95 operating systems; FAT16 can have a maximum size of 2, 147,123, 200
bytes or 2GB; Older USB drives use FAT16 file system.
 FAT32- an enhanced FAT the uses a 28-bit binary system; FAT32 was first used
in Windows 95 and Windows 98 operating systems; it was first used in large
volume hard drives, but to date, FAT32 file system is primarily used on flash
drives; FAT32 can have a maximum size of 2 TB
 exFAT (Extended FAT)- a file system developed for modern flash drives; It
can support a volume size of up to 512 TB; it implements a free space bitmap
that allows for the improved performance of free space allocation and deletion.
ATTRIBUTE FAT12 FAT16 FAT32
Used for Floppies; Small to large hard Large to very large
Small hard drives drives hard drives
Size of each FAT 12 bits 16 bits 28 bits
Entry
Maximum number 4,096 65,536 268,435,456
of clusters
Supported cluster 512 to 4 KB 2KB to 32KB 4KB to 32KB
sizes
Maximum volume 16,736,256B 2,147,123,200 2GB
size (16MB) B (2TB)
(2GB)

Windows XP, Windows 7, and Windows 8 operating systems do not use FAT file system,
instead these use a different kind of file system called New Technology File System
(NTFS).

2. New Technology File System (NTFS)


NTFS is a file system that was initially developed for Windows NT and later utilized by
Windows XP, Windows 7, Windows 8 along with some versions of UNIX operating
system. Reliability, security, and support for client-server systems are some
improvements of the NTFS volume. MFT contains the file name, file attributes, and
pointers to fragments.

Key Features of NTFS


 It supports long file names.
 It is not case-sensitive
 It is a recoverable file system, that if a power outage or system failure occurs,
computer users can redo failed operations.
 It maximizes storage space by supporting the compression of files and
directories.
 It can support storage devices with up to 16 Exabytes volume or size.
 It protects files and directories thus providing local security for users
 It supports spanning volumes where directories and files can be placed across
different hard drives.
3. Resilient File System (ReFS)
ReFS is a file system designed by Microsoft and originally contained in Windows server
2012. It was to be a replacement for NTFS and features a number of improvements.

Improvements on ReFS
 Removal of check (chkdsk)
 Handling of hard drive failure and redundancy
 Ability to handle longer file names and file paths
 Virtualization of storage and pooling
 Automatic integrity checking and cleaning of data
Linux File System
1. Ext2 (second Extended File System)
 Designed and developed in 1993 by Remy Card
15
 Developed to overcome the limitation of the original ext file system
 Recommended on flash drives and USB drives
 Its maximum individual file size can range from 16GB to 2GB
 Its overall file system size can range from 2 TB to 32 TB
2. Ext (third Extended File System)
 Designed and developed in 2001 by Stephen Tweedie
 Supported by Linux Kernel 2.4.15 ext3 and later Linux Kernel versions
 It allows journaling, which is the main feature of Ext3, that provides dedicated
area where all changes are tracked thus reducing the possibility of system
crashes.
 Its maximum individual file size can range from 16GB to 2 TB
 Its overall ext3 system size can range from 2TB to 32 TB
 An ext2 file system can be converted to ect3 file system directly (without the
need for backup/restore)
3. Ext4 (fourth Extended File System)
 Developed in 2008
 Supported since Linux Kernel 2.6.19 and later versions
 Supports a large individual file size and overall file system size
 Its maximum individual file size can range from 16GB to 16 TB
 Its overall maximum file system size is 1 EB (Exabyte)
 Its directory can include a maximum of 64,000 subdirectories
 It can mount an existing ext3 f as ext4 fs without having to upgrade it
 It features multiblock allocation, delayed allocation, journal checksum, etc.
 It has the option of turning off the journaling feature

4. Other File System


 Hierarchical File System (HFS)- used by MAC OS to save files on hard disks,
CD/DVD ROM discs, and floppy disks
 Universal Data Format (UDF) – a file system designed by Optical Storage
Technology Association normally used with CD/DVD drives. It is supported by all
operating systems and permits the creation of a CD/DVD on Windows to be
readable on MAC OS.

Worksheet 4.4
IDENTIFICATIONS:
___________1. A file system used by MAC OS to save files on hard disk, CD/DVD ROM discs,
and floppy disks.
___________2. A file system designed by Optical Storage Technology Association normally
used with CD/DVD drives.
___________3. A file system designed by Microsoft intended to be a replacement for NTFS.
___________4. A file system designed and developed by Remy Card in 1993
___________5. It contains the file name, file attributes, and pointers to fragments in NTFS.
___________6. It is the oldest type of FAT used on an 8-inch floppy disk.
___________7. It is the process of organizing and retrieving files from storage devices such
as a flash drive and hard drive.
___________8. It describes stored data in a file system
___________9. It is a file system initially developed for Windows NT and later utilized by
Windows XP, Windows 7, and Windows 8, as well as some version of the UNIX operating
systems.
___________10. It is a system of monitoring the content of storage devices used by older
Microsoft operating systems like DOS.

ACRONYM:
1. FAT _______________________________________
2. NTFS _______________________________________
3. ReFS _______________________________________
4. HFS _______________________________________
5. UDF _______________________________________
6. ext4 _______________________________________
7. exFAT _______________________________________
8. FS _______________________________________
9. MFT _______________________________________
10.ext2 _______________________________________

16
Lesson 4.5: Device Drivers
Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
A device driver is a set of programs that enable hardware devices to interact with the
operating system. A hardware device would not function if the appropriate driver is not
installed on the computer system.
Ways of location Software Drivers
1. Determine the hardware
Make sure the Manufacturer and model of the hardware device are known before
searching for the device driver. Search for the driver(s) of the hardware device
connected to the computer and manufactured by an OEM (Original Equipment
Manufacturer). For computer manufacturers like HP, DELL, and Sony that use other
company’s part and sells it under it own brand name, look for the driver on the
OEM’s web page.
Popular Computer Manufacturers (OEM)
OEM LOGO DESCRIPTION
Alienware Manufacturer of high-end computers,
laptops, and gaming computers. The
company was purchased by Dell, which
continually supports the Alienware product
line.
Apple Apple is the main manufacturer of a line of
personal computers, peripherals, and
software under the Apple Macintosh
(Mac)brand name.
Acer America Established in 1977 as a subsidiary of the
Acer group; to date, the Acer group offers
a wide range of computer related products.
ASUS ASUS is one of the largest manufactures of
computers motherboards, laptop, tablets,
and other computer peripherals.
Dell Dell is one of the largest and fasted-
growing major computer companies in the
world that allows computers to order a
computer directly from the factory, as well
as from a retail electronics store.
Fujitsu Fujitsu is a Japanese company that makes
a wide of range of computer-related
products.
HP Hewllet-Packard is one of the world’s
largest computer peripheral companies
and the foremost producer of test and
measurement instrument.
IBM IBM is one of the most known and
successful computer companies of the
world.
Lenovo One of the world’s largest manufacturers
of computer and portable devices.
Toshiba Toshiba is manufacturer of computers, CD-
ROM drives, displays, laptops, hard drives,
and other computer and electrical
components.
Samsung Samsung was founded in 1938 and is the
manufacturer of computer products and a
wide range of other computer electronics
in other products.
Sony Sony is a manufacturer of electronics,

17
computer hard ware devices, such a
laptops, desktops, digital, cameras, and
more.

2. Download Location
The drivers of hardware devices of often listed on the manufacturer’s web page. If the
manufacturer of the hard ware device is already out of business, use third party
companies who specialize in offering obsolete divers.

Third Party Companies Offering Obsolete and Updated Drivers.


COMPANY LOGO DESCRIPTION
MRDriver An excellent site that contains a large
listing of links and downloads to driver-
related pages for free.
Driver Guide An excellent site that contains listing of
several million drivers. It does require a
user’s account.
Driver Agent A great site and service that scans a
computer to automatically detect and list
available drivers that need to be updated.
However, downloading any driver requires
a registration fee.
DriversHQ A great site that enables users to scan
their computers and locate updates for
their computer’s hardware devices.
However, downloading any driver requires
a registration fee.

Installing a Computer Driver


1. Download Drivers
Most device drivers to be downloaded are contained in a single file. The file is either
executable or compressed. If it is compressed file, uncompressing it is necessary
before installing the file. Remember the folder where the uncompressed or extracted
file was placed.

2. Executable
Most computer hardware manufacturer prepackage their drivers into an executable file
or installs them on a setup file Double-click the setup or executable file to install the
drivers to the computer.

3. Using the Have Disk Option


It is common for computer hardware manufacturers to put the drivers on CD/DVD, a
diskette or be downloadable for windows to look up and use during the hardware
detection process.

Upgrading Drivers for Pre-Existing Device


1. Click Start Menu
2. Type Device Manager
3. Click Device Manager
4. Select the device to be updated
5. Right-click and choose the desired option
6. Select Search automatically for updated driver software for Windows to search for the
updated driver on the computer and Internet. Optionally, select browse my computer
for the driver software to manually look for the updated driver.

Hardware Device Drivers that need to be installed


1.BIOS Updates- need to be installed if the computer has compatibility issues with
hardware or the hardware is not operating as it should.
2. Controllers- installing updated drivers for controllers makes the computers system more
reliable and improves the performance of the drives installed on the computer.
3. Modern- install the latest driver for the modern to improve it reliability and speed.
4. Chipsets- install the latest drivers for the chipsets and motherboard will improve the
compatibility, reliability, and performance of the hard ware connected to the computer.
5. NIC (Network Interface Card)- install the latest drivers for the NIC to improve the
reliability of the LAN card installed in the computer.
18
6. Printer- install updated drivers for a printer to improve the reliability and compatibility
of the printer installed on the computer.
7.Sound Card- update drivers for the sound card to improve the reliability, compatibility,
and performance of the sound card.
8. Video card- driver updates for video card can resolve issues concerning the
compatibility with the video card; it will also improve the reliability and performance of the
video card.

Worksheet 4.5
NAME: _________________________________ SCORE:
______

1. Enumerate and discuss the hardware device drivers needed to be installed on the
computer system.
2. Enumerate and discuss the different methods of installing drivers.

Lesson 4.6: Unwanted Software


Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
Recognizing and inspecting unwanted software can be challenging. New types of
unwanted software are always under development. The technology used to develop
unwanted software is also used for software that a computer user may want to keep and
use. To automatically identify whether a program should be kept or removed is not always
possible.

Criteria to determine if software is unwanted


1. Unwanted behavior
The software executes undesirable programs on the computer. It does not show
enough information about its behavior or gets proper consent from the user. It forbids
the user from managing its own activity while its execute on the computer. It disallows
the user from removing or uninstalling the program.
2. Advertising
It advertise a product or service and interferes with the user while operating the
computer. Some features of advertisement are that it contains a way to close the ad so
that other ads will not open and it shows the name of the software that produced the
ad.
3. Privacy
It keeps track of programs or software installed on the computer. It saves or transmit
the activities performed by the computer without the consent from the user.
Potentially Unwanted Programs (PUPs)
PUPs or Malicious Software (Malware) are pieces of software that a computer user may
want to be notified about an subsequently remove them from the computer. PUPs are
typically created to change the security configuration of the computer or invade the
privacy of the computer user for financial purposes, identify theft, or privacy.

Behavior of Malicious Software (Malware)


1. Installation- become part of a system and alters the system thus enabling its code to
run frequently or during start-up.
2. Surveying- look or searches for another soft ware target inside the computer system.
3. Replication- becomes part of the software installed on the computer system
4. Concealment- hides its presence from the users and prevents its removal from the
system
5. Injection- becomes part of the code or data harmless programs inside the system to
acquire privileges and to conceal itself.
6. Payload- alters something on the system, transmits data to the other computers, and
accepts commands from other computers.

Types of Malware
19
1. Adware
Adware are programs designed to show advertisements on the computer, change a
user’s search requests to advertising websites, and to collect marketing-type data from
the computer about the kinds of website visited by its user. More than showing
advertisements and collecting data, Adware hide their presence from the computer
user. Normally, there no indications of the software being in the system tray and there
are no signs in the Start menu that Adware was installed on the computer.

Two ways an adware can get into the computer system:


 Via freeware or shareware
 By way of infected websites visited by a computer user

2. Spyware
Spyware is a term used to refer to software that executes processes without the
consent o knowledge of the computer user.

Processes carried out by spyware


 Advertising
 Collecting personal information
 Altering the configuration of the computer
Identifying what spyware does is an elaborate process because spyware can be
customized, which makes it tough to remove from the computer. Other kinds of spyware
that can make alterations to the computer system are irritating as they slow down the
performance of the computer causes the computer to crash. This type of software alters
the web browser’s home page or search page, or adds unnecessary or unwanted
components to the browser. Spyware also makes it very hard to change computer settings
and restore a user’s configurations.

Types of Spyware
 Domestic Spyware- software that is normally installed by computers users to
keep track of the behavior of internet on their computers. Employers utilize this
software to keep track of the online activities of their employees. Parents may
also use this to monitor the activities of their children on the computer. Some
organization or individuals install domestic software without the consent of
knowledge of a computer user. Law enforcement officials use this software to
keep track of criminals while criminals also use this to collect and steal personal
information from private computers.
 Commercial Spyware- software that organization use to monitor a computer
user’s browsing activities. Organizations that monitor online activities often sell
this information to marketers that send advertisement to computers users.

3. Vital Information Resources Under Siege (Virus)


Viruses are small programs customized to spread from one computer to another and
also to disrupt computer operations. Through the course of using the Internet and the
computer, every user comes into contact with computer viruses. Most computer
viruses are checked before they begin to execute, but most computer users are
concerned with what computer viruses do and the symptoms it would manifest. A
computer virus corrupts or deletes data on the computer, uses email programs to
replicate itself to other computers, or worse, erase all data on the hard disk. Computer
viruses are usually spread by way of attachments in email messages. They can be
disguised as attachments of pictures or graphic files or audio and video files. Computer
viruses are also spread through available downloads on the Internet, They can be
hidden in illegal software or other files or programs that are downloaded.

Types of Computer Virus


 Boot virus- is design to infect the Master Boot Record (MBR) of the hard disk.
The MBR loads the operating system in the memory at bootstrap. The boot virus
replaces the boot record and overwrites it. Once the operating system starts, it
is loaded into memory with the virus. When the virus is in the memory, it will do
whatever it was designed to do.
 Program virus- designed to infect executable files. When launched, these
programs load into the memory with the virus contained within them. The virus
will then infect other files.

20
 Multipartite virus- a hybrid of boot virus and program virus. It infects .exe files
so that when the program is executed, it infect the MBR. When the operating
system starts, the virus is loaded into the memory and is now free to infect
other programs and replicate itself.
 Stealth virus- designed to avoid detection and uses different techniques to do
so. It redirects the hard disk head, making it read other memory sectors instead
of its own. It also changes the reading of the file size displayed in the directory.
 Polymorphic virus- always changes its source code from one infection to
another. Each infection is different thus detecting it is very difficult.
 Active X virus- because most users do not know how to setup ActiveX and Java
controls it leaves a potential security hole. Applets (or small applications) are
then permitted to execute on the computer that bring on ActiveX viruses.

4. Write Once Read Many (Worm)


Worm is similar to a virus but it does not need a host program to attach itself to. Worm
is a standalone program and when it infects a computer, it looks for other computers
through a local area network (LAN) or Internet connection. Once a worm finds another
computer it replicates itself in the new computer and continues to look for other
computer on the network to do the same. Because of the nature of replication
throughout the network, a worm usually consumes more system resources including
network bandwidth, thus causing network servers to stop responding.

Types of Computer Worms


 Email Worm- spread through infected email messages as an attachment or a
link to an infected website.
 Instant Messaging Worm- spread by transmitting links to the contact list of
instant messaging applications.
 Internet Worm- scans available network resources utilizing operating system
services and scans the internet for vulnerable computers; if computers are
vulnerable it will try to connect to and access them
 IRC Worm- spreads through IRC chat channels to transmitting infected files or
links to infected websites.
 File-sharing Network Worm- places a copy of itself in a shared folder and is
spread via P2P (or peer-to peer) network.

5. Trojan
The Trojan is malicious software that does not replicate itself. The name was derived
from the mythical story of Greek soldiers who hid inside a giant wooden horse meant to
be a gift to the city of Troy. After dusk, the Greek soldiers opened the gates of Troy to
let in the rest of their army army and captured the city. The name is befitting because
this type of malicious software disguises itself as useful software. When trojan accesses
the system, it install or downloads other malware on the computer.

Common factors of Trojans


 Does not self-replicate
 Disguised as harmless or useful software
 Opens the computer systems to more harm

Types of Trojans
 Password stealer- typically targets a specific type of password. The most
harmful password stealers are the following;
* Banker Trojans- collects banking credentials to steal money from a bank account
* Gamethief Trojan- steals account information from online games
* Trojan-IM- steals account information from instant messaging
* Key-logger Trojan- steals anything typed on the computer

 Destructive Trojans- destroys an operating systems to annoy or irritate a


computer user
* Ramson Trojan- changes files which makes it hard for a user to access his or her
own files.
* Security Software Disabler- designed to disable security programs; its primary
function is to
make the computer vulnerable to the next Malware attack.

21
 Backdoor/RAT (Remote Access Trojan)- the most widespread type of Trojan; It is
designed to make the computer accessible to outside parties for several
purposes.
* Denial of service (DoS) attack- infect several computers in advance and makes
the infected computers attack the target computer at a time instructed by the
controller; Computers that are under control are referred to as botnets.
* Trojan Clicker- used to execute online actions to increase hit- counts
* Proxy Trojan- transform the target computer into a proxy so that operator of the
Trojan can execute online transactions anonymously

 Mailfinder Trojan- collects email-addresses from infected computers


 Dropper- installs other malicious software on the target computer; typically,
Dropper is a .axe file that contains other files inside it
 Trojan Spy- refers to customized software used to spy on a specific user; the
more customized a Trojan spy is, the more difficult it is to detect
 Trojan ArcBomb- typically functions to slow down mail servers.
 Trojan SMS- typically designed to infect mobile devices

6. Rootkit
Rootkits are used to hide malware on the computer. Malicious software hidden by
rootkit monitors, filters, and steals data or exploits computer resources. A hacker
maintains his hidden presence on the computer by using rootkit. A better rootkit can
remain in a computer for years, If undetected.

7. Rouge Security Software


Rouge security software or scareware is software that looks to be helpful to the
security of a computer but instead gives limited or no security at all. It produces
erroneous or misleading alerts or tries to lure users to participate in suspicious
transactions. Rogue security software displays legitimate looking pop-up windows that
advertise security update software. These windows might appear on screen while
browsing the Internet.

What does rogue security software do?


Rogue security software reports a virus, even though the computer is clean. It does not
report viruses when the computer is infected. Rogue security software does the following;
 Lures a user into a suspicious transaction
 Uses social engineering to steal personal information
 Installs Malware that cannot be detected as it steals data
 Launches pop-up windows with false or misleading alerts
 Slows down the computer or corrupts files.
 Disables Windows updates or disables to legitimate antivirus siftware.
 Prevents the user from visiting antivirus websites.

8. Ransomware
Ransomware stops a user from using the computer, It holds the computer on files for
ransom. Examples of Ransomware are “FBI Moneypak” or the “FBI virus” because they
use FBI logos. Normally, most types of Ransomware prevent a user from using the
computer and asks the user to do something before he or she can use the computer.
 Prevent a user from accessing Windows
 Encrypt files so a user can’t use them
 Stop certain apps from running such as web browser
 Demand a user to pay money so he can access the computer
 Demand the user to complete a survey

Worksheet 4.6
Fill in the Blanks
Write the correct answer on the space provided.

1. Rouge security software is also known as _________


2. Trojan is a malware that does not _________ itself.
3. Worm is similar to virus but it dies not need a ___________ program to attach itself to.
4. Boot virus is designed to __________ the Master Boot Record (MBR) or the hard disk.
5. Password ___________ typically targets a specific type of password
6. Rootkits are used to ___________ malware on the computer
22
7. ___________ is normally installed to keep track of the behavior of computers users
8. Commercial Spyware are used by organizations to ___________ a computer user’s
browsing activities
9. PUPs or ___________ are pieces of software that a computer user may want to be
notified about in order to remove them from the computer.
10.Adware are programs designed to show _____________ on the computer.

DISCUSSION:
1. What type of PUP is the most dangerous? Why?
2. Differentiate a Virus from Worm and Trojan.
3. In what way does a spyware become beneficial to an organization? How can it be
harmful to an individual user?

Lesson 4.7: Computer Security


Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
Hackers and Identity thieves try to steal someone’s personal information or money.
Annoying pop-ups and other distractions always appear while surfing the Internet. Most of
these pop-ups contain malware that can infect a computer and enable hackers to steal
important information such as credit card numbers and password thus causing a computer
user to lose money.

Files downloaded from the Internet like music, movies, games, etc. may have a virus,
Trojan or worm attached to them that can cause the computer to slow down, freeze, or
crash. Even the bandwidth of an organization’s network can be diminished by worms that
attack computers in a network. Computer security is very necessary to prevent the
infection by malware.

Steps to help keep the computer secure:


1. Use security Software that updates automatically
Cyber criminals constantly develop new methods to attack a computer. It is
important that security software be up-to-date to protect computers against the
latest threats. Most security software can update automatically. The operating
system and web browser can also be set to update automatically. If the operating
system, web browser, or security software are out-of-date, cyber criminals can
inject malware into a computer and use it to access other computer, send spam, or
spy on browser activities. Do not purchase security software offered by way of pop-
up messages or emails, especially messages that claim to have scanned the
computer system and found malware.

Trusted Free Antivirus Software


AOL COMPUTER MCAFEE SECURITY SYMANTEC SECURITY
CHECKUP SCAN SCAN
Audit my PC Microsoft Safety Scanner Trend Micro House Call
Virus Scan
Avast! Free Antivirus Norton Security Scan Vipre Internet Security
2013
AVG AntiVirus FREE 2015 Panda Security Antivirus Webroot Secure
Scan Anywhere Antivirus
Bitdefender Qualys Browser Check Circle PureCloud
Vulnerability Scanner
ESET Online Scanner Secunia PSI Trend Micro Security
Assesment
Kaspersky Virus Scanner Sophos Free Security
Tools

2. Watch out for phishing

23
Phishing is the process of impersonating a business to trick someone into giving
their personal information. Credit card numbers and bank account numbers can be
used to steal money or open new accounts in someone’s else name. Be careful
when answering questions asking for personal information whether in web form, an
email, text, or phone message. Phishers will do everything to appear trustworthy to
their intended victims.

Examples of Phishing Messages


 “During our regular verification of accounts, we couldn’t verify your
information. Please click here to update and verify your information.”
 “Our records indicate that your account was overcharge. You must call us
within 7 days to receive your refund.”
 “We suspect an unauthorized transaction on your account. To ensure that your
account is not compromised, please click the link below and confirm your
identity.”

3. Check Out Companies to Find Out Who You are Really Dealing With
If an advertisement of an offer looks too good, take time to check out the company
behind it. Search for the profile of the company or the product name and append
terms like “complaint,” “review,” or “scam” in the search box of a web browser. If
bad reviews appear, decide if the offer is worth the risk. If there is no contact
information provided for the company it is best to decline the offer. Keep in mind
that not all advertisement, even on a reputable site, is trustworthy. Though a site
may feature an ad for another site, it does not necessarily mean that it endorses
the advertised site is or is even familiar with it.

4. Give Personal Information Over Encrypted Websites Only


If banking or shopping online, transact with sites that use encryption to protect
information. To Know if a website is encrypted, look for the syntax https at the
beginning of the web address. Some websites may only use encryption for the sign-
in page, but if any part of the session is not encrypted, the entire account could be
compromised. Look for https on every page of the site, not only for the sign in page.

5. Protect Passwords
Create strong passwords to keep them safe;
 The longer the password, the toucher it is so crack. It is best to use a minimum
of 10 characters.
 Mix letters, numbers, and special characters. Do not use names, birthdates, or
common words,
 Do not use the same password for multiple accounts.
 Do not share passwords over the phone, by text or by email.
 If written, keep passwords in a secure place, out of plain sight

6. Back Up Files
No computer system is completely secure. Copy important files onto a
removable disk or into an external hard drive and store it in a safe place.

Preventing Malware Entering the computer System


The following guide can be used to prevent or reduce the risk of downloading
unwanted malware and spyware.

 Keep security software updated. The computer should have anti-virus and anti-
spyware software as well as a firewall set up. Set the security software, Internet
browser, and operating system to update automatically.
 Type the URL of the site directly into a browser instead of clicking on a link in an
email. Cyber criminals often send emails that appear to be from reputable
companies. The links may look real, but clicking on them could download
malware or send a bogus site designed to steal personal information.
 Do not open attachment in emails sent by strangers. Opening attachments in
emails that seem to be from friends or family can inject malware onto the
computer.
 Download and install software only from known and trusted websites.
Downloading free games, file-sharing programs, and customized toolbars may
come with malware.

24
 Minimize “drive-by” downloads. Make sure the browser security setting is high
to detect unauthorized downloads.
 Use a pop-up blocker and do not click on any links within pop-ups. Close pop-up
windows by clicking on the “X” in the title bar.
 Resist buying software in response to unexpected pop-up messages or emails,
especially advertisements that claim to have scanned the computer and
detected malware.
 Discuss safe computing with children. Tell the children that some online
activities can place the computer at risk like downloading “free” games or
programs, clicking on pop-ups, posting personal information, or opening chain
mails.
 Back up data regularly. Backing up data is necessary in case the computer
crashes.

Symptoms of Computers Infected by Malware


 Computer slow down, crashes, or display repeated error messages
 The computer will not shut down or restart
 The computer displays a barrage of pop-ups
 The computer displays web pages that a user did not intend to visit or sends
emails not composed by its user
 New and unexpected toolbars appeal
 New and unexpected icons appears as shortcuts on the desktop
 There is a sudden or repeated change in the computer’s Internet home page
 The laptop battery quickly drains more than it should

Cybercrime
The Internet brings the world closer thus creating a smaller place where computers users
communicate and interact. But, it also creates a big problems for users who spend long
hours surfing the World Wide Web. Cybercrimes are steadily growing and many users have
been victimized by malicious software, hacking, and identity left. The following are the
common types of cybercrimes.
1. Cyber Stalking- a type of harassment on the Internet where the victim is attacked
by a barrage of email and online messages. In this case, cyber stalkers usually
knows their victims and use the Internet to stalk them.
2. Hacking- a kind of cybercrime where a computer is accessed without proper
authorization from the user in order to acquire sensitive information. The
cybercriminal uses different software to break into a user’s computer and the user
is not aware that the computer was already accessed from a remote location.
3. Malicious software- Internet-based applications or programs that are used to
destroy a network. The software is used to access a system in order to steal
sensitive information and cause damage to software installed on the system.
4. Theft- occurs when a cybercriminal ignores or breaches copyright and downloads
movies, games, music, and software. Peer sharing websites that propagates
software piracy are under investigation by authorities.
5. Child solicitation and abuse- a kind of cybercrime wherein cybercriminals seek
minors through chat rooms for child pornography. Authorities have been tracking
chat rooms frequented by children for the purpose of preventing child solicitation
and abuse
6. Identity theft- a serious problem with users who hold cash transaction and banking
services over the Internet. A cybercriminal accesses data about a person’s bank
account, credit cards, debit card and other sensitive information to transfer money
or to purchase things online in the victim’s name.

Worksheet 4.7
DISCUSSION
1. Enumerate and discuss some of the steps in securing computers.
2. Discuss the common types of cybercrimes.
3. In your own way, how can you prevent cybercrime?

25

You might also like