ICT10 ModuleQ4
ICT10 ModuleQ4
1
systems software available on a computer system provides the capabilities and the
limitations within which an applications software can operate.
3. Programming Software
Programming software is a tool used by programmers to build computer programs. It
involves the use of a text editor, interpreter and compiler. To date, programming
software has am Integrated Development Environment (IDE) that enables a
programmer to build programs visually. Examples of programming Software are Visual
Basic, C/C++, and Java.
2
4. Malware
Malware are software that can threaten computer security. Viruses and worms
replicate themselves and attack computer software. An example of malware is the
trojan horse that at first may seem to be a helpful program but it actually steals
information. Spyware monitors user’s activity without their knowledge.
5. Adware
Adware is a tool that can be used to generate revenue. It extracts user information
especially about the Websites frequently visited by a user. It is usually a pop-up that
appears on screen containing an advertisement.
Worksheet 4.1
IDENTIFICATION:
_____________1. Enables users to create rich presentations that can be used for seminars,
classrooms, meetings, and other special occasions.
_____________2. It is standard software that is not specifically designed to a user’s or an
organization’s needs.
_____________3. Personality who coined the term “Software” in 1958.
_____________4. Software that is used to accomplish a specific task.
_____________5. It represents an image as a rectangular grid of pixels, or points of color,
viewable via a monitor, paper, or other display medium.
_____________6. The ability of a machine or program to receive an interpret dictation or to
understand and carry out spoken commands.
_____________7. Software developed for a specific user or organization.
_____________8. It is the interface between the computer hardware and applications that
can be directly manipulated by a programmer.
_____________9. It is the combination of text, graphics, audio, and animation.
_____________10. It provides different support services that help the operations,
management, and users of the computer system.
Process Management
Process management is the supervision of programs or jobs running on the CPU at a
certain time. The operating system loads a program into the main memory for execution.
Operating systems may feature advanced forms of process management.
Multitasking – Also called multiprogramming, is the capability of the operating
system to run two or more programs or tasks on the computer system.
Multithreading - A type of multitasking that runs multiple tasks within a single
program simultaneously.
Time-sharing – An additional to multiprogramming where several users operate
a computer system with one processor but using different terminals.
Multiprocessing – This happens when a computer system with several CPUs
execute several programs or threads by assigning the programs or threads to
different CPUs
Virtual Memory – Permits an application to act as if it has access o the full
storage capacity of a computer system, rather than just access to the size of
main storage installed on the computer system. It virtually enlarges the
capacity of the primary storage and increases the speed of the computer.
Fault Tolerance – It is the capability of a computer system to give the correct
output and to keep operating even after an error or a fault occurs. It involves
error-correcting memory, recurring computer components and related software
that secures the system from operating system, user, or hardware errors.
OS IMAGE DESCRIPTION
NAME
Android A free Linux based OS for touchscreen mobile
devices such as smartphones and tablet
computers. Initially developed by Android, Inc.,
which google financed and eventually bought.
iOS Apple’s proprietary operating system for iPhone,
iPod Touch, iPad and Apple TV.
BlackBerry A proprietary mobile OS by BlackBerry Ltd. It is
OS the predecessor of the BlackBerry 10 mobile OS.
BlackBerry10 A proprietary mobile OS for BlackBerry
smartphones and tablets.
4
Windows Series of proprietary mobile operating systems
phone developed by Microsoft. The successor to the
windows Mobile platform.
Windows RT A variant of the windows 8 operating system for
mobile devices.
Windows A family of mobile OS developed by Microsoft for
Mobile Smartphones and Pocket PCs. Windows Mobile is
the predecessor of windows Phone.
Bada An operating system developed by Samsung
Electronics for mobile devices such as
smartphones and tablet computers.
Symbian OS A mobile operating system and computing
platform designed for smartphones. It is currently
maintained by Accenture but was originally
developed by Symbian Ltd.
Aliyun OS A Linux distribution designed for smartphones and
developed by AliCloud, a subsidiary of the Chinese
company, Alibaba Group. Aliyun OS is also known
as Yun OS.
Firefox OS A Linux based open source operating system
developed by Mozilla for Smartphones and tablet
computers.
Ubuntu A mobile interface for Ubuntu developed by
Touch Canonical Ltd. It was designed primarily for
touchscreen mobile devices such as smartphones
and Tablet computers.
Nokia Asha A mobile OS and computing platform designed for
low-end, borderline smartphones.
Palm OS A mobile operating systems, initially developed by
Palm, Inc., for personal digital assistant (PDAs).
Palm OS is also known as Garnet OS.
Sailfish OS Linux-based mobile operating system developed
by Jolla in cooperation with the Mer project and
supported by the Sailfish Alliance.
GridOS GridOS was built by Fusion Garage using open
source code from the Android kernel. It is the
operating system of the Grid 4 mobile phone and
Grid 10 tablet.
Mer project Mer is a division of MeeGo. I T is an open, mobile-
optimized, core distribution aimed at device
manufacturers.
Brew BREW stands for Binary Runtime Environment for
Wireless. It is an application development platform
created by Qualcomm, originally for CDMA (Code
Division Multiple Access) mobile phones.
SHR SHR stands for Stable Hybrid Release. It is a
community-driven Linux distribution for
smartphones which is based on Open Embedded
and the FSO framework.
webOS A mobile operating system based on a Linux
kernel that was initially developed by Palm. It was
later acquired by Hewlettpackard then by LG
Electronics.
Tizen An open source operating system for
Smartphones, tablets, in-vehicle infotainment
(IVI)devices, and smart TVs.
Limo4 An open source, hardware-independent, Linux
based mobile operating system for smartphones
device. It is from the LiMo Foundation, a non-profit
technology consortium organization.
Maemo A software platform, based on the Debian Linux
distribution, for smartphones and tablets.
MeeGo A Linux based free mobile operating system
designed for hardware platforms such as
5
netbooks, entry-level desktops, nettops, tablet
computers, mobile computing and
communications devices, in- vehicle infotainment
devices, Smart TV / Connected TV,IPTV-boxes,
smartphones, and other embedded systems.
Nucleus Areal-time operating system (RTOS) and toolset
RTOS created by the Embedded Systems Division of
Mentor Graphics. It is designed for embedded
system applications including consumer
electronics, set-top boxes , cellular phones, and
other portable and handheld devices.
Mac OS X Versions
VERSION CODENAME LOGO RELEASE DATE
OS X 10.10 Yosemite October 16,2014
OS X 10.9 Mavericks October 22,2013
OS X 10.8 Mountain Lion July 25, 2012
Mac OS X 10.7 Lion July 20,2011
Mac OS X 10.6 Snow Leopard August 28, 2009
Mac OS X 10.5 Leopard October 26,2007
Mav OS X 10.4 Tiger April 29,2007
Mac OS X 10.3 Panther October 24,2003
Mac OS X 10.2 Jaguar August 24,2002
Mac OS X 10.1 Puma September
25,2001
Mac OS X 10.0 Cheetah March 24, 2001
Public Beta Kodiak September
13,2000
Worksheet 4.2
Matching type
Match the item in Column A with Column B. Write the letter of the correct answer on the
space provided before each number.
COLUMN A
COLUMN B
CLI operation is relatively easy but not user-friendly. Modern computers still support
the CLI, especially those who use Windows OS. CLI features a command prompt that
involves a series of characters and notifies users that the CLI is ready to accept
commands.
MS-DOS (Microsoft Disk Operating System)- Developed for IBM compatible PCs.
It was originally written by Tim Patterson and released to the public by Microsoft
in 1981. MS-DOS was last updated in 1994, but its command prompt shell is still
used today especially for troubleshooting the PC. Just type cmd in the Start
menu and press Enter to open the command shell.
COMMAND DESCRIPTION
attrib Display and change file attributes
Batch Recovery console command that executes a series of command in
a file
bcdedit Modifies the boot configuration data store
break Enables and disables the CTRL + C feature
cd Changes Directories
chkdsk Check the hard drive running NTFS for errors
cls Clears the screen
Cmd Opens the command interpreter
Color Changes the foreground and background color of the MS-DOS
window
command Opens the command interpreter
control Opens control panel icons from the MS-DOS prompt
Convert Covert FAT and NTFS
copy Copies or more files to an alternate location
date Views or changes the system’s date
defrag Rearranges the hard drive to help with loading programs
del Deletes on or more files
dir Lists the content of one or more directory
disable Recovery console command that disables Windows system sevices
10
or drivers
diskcopy Copies the content of one disk and place them on another disk
Echo Displays messages and enables and disables echo
edit Views and edit files
erase Erases files from the computer
Exit Exits from the command interpreter
fdisk Utility used to create partitions on the hard drive
For Boolean used in batch files
format Command to erase and prepare a disk drive
goto Moves a batch file to a specific label or location
help Displays a listing of commands and a brief explanation
if Allows for batch files to perform conditional processing
ipconfig Network command to view network adapter settings and assigned
values
label Changes the label of a disk drive
md Command to create a new directory
mem Displays memory on system
mode Modifies the port or display setting
more Displays one page at a time
move Moves one or more files from one directory to another directory
net Updates, fixes, or views the network or network settings
netsh Configures dynamic and static network information from MS-DOS
netstat Display the TCP/IP network protocol statistics and information
nslookup Looks up an IP address of a domain or host on a network
path Views and modifies the computer’s path location.
pathping Views and locates location of network latency
pause Command used in batch files to stop the processing of a command
ping Tests and sends information to another network computer or
network device
Print Prints data to a printer port
rd Removes an empty directory
rename Renames a file or directory
route Views and configures Windows network route tables
shift Changes the position of replaceable parameters in a batch
program
shutdown Shuts down the computer from the MS-DOS prompt
sort Sorts the input and displays the output to the screen
time Views or modifies the system time
title Changes the title of their MS-DOS window
tracert Visually displays a network packet’s route across a network.
tree Views a visual tree of the hard drive
Type Displays the contents of a life
undelete Restores a file that was deleted
unformat Unformats a hard drive
ver Displays information about the version
vol Displays the volume information about the designated drive
xcopy Copies multiple files, directories, or drives from one location to
another
The content of files can be compared and altered with the following commands.
COMMAND DESCRIPTION
awk Pattern scanning and processing language
cmp Compares the content of two files
comm Compares sorted data
cut Cuts out selected fields of each line of a file
diff Differential file comparator
expand Expands tabs to spaces
join Joins file on some common field
perl Data manipulation language
sed Stream text editor
sort Sort file data
split Splits file into smaller files
tr Translates character
uniq Reports repeated lines in a life
wc Counts word, lines, and characters
vi Opens vi text editor
vim Opens vim text editor
fmt Simple text formatter
Spell Checks text for spelling error
ispell Checks text for spelling error
emacs GNU project Emacs
Ex, edit Line editor
emacs GNU project Emacs
2.Graphical User Interface (GUI)-The most common type of user interface today. It uses
pictures, graphics and icons. GUI is also known as WIMP (Windows, Icons, Mouse, and
pointers). Most applications run in GUI are known as WYSIWYG (What You See is What You
Get). GUI tries to make sure that whatever displayed on the screen will be printed the way
it looks on the screen.
12
with a one-line command.
Multitasking Although many command GUI users have windows
line environment are that enable a user to
capable of multitasking, view, control and
they do not offer the same manipulate multiple
ease and ability to view things at once and are
multiple things at once in faster to navigate when
one screen. compared to a
command line.
Speed Command line users only A GUI may be easier to
need to use their be use because of the
keyboards to navigate a mouse, However, using
command line interface a mouse and keyboard
and often only need to to navigate and control
execute a few lines to the Operating system
perform a task. for many things is
slower than someone
who knows how to work
in a command line.
Resources A computer that only uses A GUI requires more
the command line takes up system resources
less of the computer’s because each of the
system resources than a elements such as icons,
GUI fonts, etc. need to be
loaded. In addition,
video drivers, mouse
drivers, and other
drivers that need to be
loaded also take up
additional system
resources.
Scripting A command line interface Although a GUI enables
enables a user to script a a user to create
sequence of commands to shortcuts, tasks, or
perform a task or execute other similar actions, it
a program. does not come close in
comparison to what is
available through the
use of a command line.
Remote Access When accessing another Although remote
computer or networking graphical access is
device over a network, a possible , not all
user can only manipulate computers and
the device or its files using especially not all
a command line interface. network equipment
have this ability.
Diverse Learning how to navigate Each GUI has a different
and use a command line, design and structure for
does not differ much with a performing different
new GUI. Because though tasks. Even different
new commands may be versions of the same
introduced, the original GUI, such as windows,
commands are the same. can have hundreds of
variations between each
version.
Strain The command line allows Although shortcut keys
the user to keep their can be learned to help
hands on the keyboard and reduce movement from
rarely have to move from the keyboard to the
the keyboard to the mouse, there is still a lot
mouse. Moving back and of movement needed to
forth between a keyboard switch between the
and mouse can cause keyboard and mouse
strain. when using a GUI.
13
Worksheet 4.3
1.Complete the table below:
TOPIC CLI GUI
Ease
Control
Speed
Resources
Strain
To know what are the file systems of storage devices installed on a computer system, type
disk management on the start menu then click Create and format hard disk
partitions.
The Disk Management window will appear to display available storage devices, their
respective sizes, free space available, and file systems.
All digital files are stored on storage devices with a particular size. Storage devices are a
series of virtual boxes for reading or both reading and writing digital data. Groups of bytes
of data in storage will have its own location called address. Storage can be represented
as a grid with a set of numbered cells. Normally, computer storages utilize a pair of sector
and in-sector offset to reference any byte of data on the storage device.
A sector is a group of bytes that is the minimum addressable unit of the physical storage.
This system is used to maximize storage addressing and uses a smaller number to
reference any part of data on the storage. Each file is saved to unused sectors and can be
read by known location and size.
File System
A file system is an organized data model and a group of metadata that describe the stored
data. A file system not only functions to organize the whole storage but also to be part of
disk partition, which is a unique storage portion of a storage device. Normally, a file
system operates blocks, not sectors. File system blocks are set of sectors that maximize
storage addressing. Modern file systems normally use block sizes 1 up to 128 sectors.
Files are usually stored from the beginning of a block and takes all blocks. Massive write/
delete operations to a file system can result to file system fragmentation, which causes
parts of a file to be stored separately to different blocks far away from each other.
Fragmentation can slow down the normal speed of a computer system. Defragmentation is
necessary to consolidate parts of files that are fragmented. To meet various requirements
regarding storage performance, stability and reliability, different file systems are
developed to serve certain computer user purposes.
14
1. File allocation Table (FAT)- a system of monitoring the content of storage devices that was
used by older Microsoft operating systems such as DOS. The table in FAT is a chart of
numbers that refer to group or cluster addresses on the storage device.
FAT8-oldest type of FAT used on 8-inch floppy disk
FAT12-used a 12-bit binary system inherited from FAT8; it was used on 3.25
floppy diskettes and small volume hard drives; a storage device using FAT12
can have a maximum of 16,736,256 bytes or 16MB; FAT12 is now obsolete.
FAT16-used a 16-bit binary system; it was utilized for windows 3.1 to windows
95 operating systems; FAT16 can have a maximum size of 2, 147,123, 200
bytes or 2GB; Older USB drives use FAT16 file system.
FAT32- an enhanced FAT the uses a 28-bit binary system; FAT32 was first used
in Windows 95 and Windows 98 operating systems; it was first used in large
volume hard drives, but to date, FAT32 file system is primarily used on flash
drives; FAT32 can have a maximum size of 2 TB
exFAT (Extended FAT)- a file system developed for modern flash drives; It
can support a volume size of up to 512 TB; it implements a free space bitmap
that allows for the improved performance of free space allocation and deletion.
ATTRIBUTE FAT12 FAT16 FAT32
Used for Floppies; Small to large hard Large to very large
Small hard drives drives hard drives
Size of each FAT 12 bits 16 bits 28 bits
Entry
Maximum number 4,096 65,536 268,435,456
of clusters
Supported cluster 512 to 4 KB 2KB to 32KB 4KB to 32KB
sizes
Maximum volume 16,736,256B 2,147,123,200 2GB
size (16MB) B (2TB)
(2GB)
Windows XP, Windows 7, and Windows 8 operating systems do not use FAT file system,
instead these use a different kind of file system called New Technology File System
(NTFS).
Improvements on ReFS
Removal of check (chkdsk)
Handling of hard drive failure and redundancy
Ability to handle longer file names and file paths
Virtualization of storage and pooling
Automatic integrity checking and cleaning of data
Linux File System
1. Ext2 (second Extended File System)
Designed and developed in 1993 by Remy Card
15
Developed to overcome the limitation of the original ext file system
Recommended on flash drives and USB drives
Its maximum individual file size can range from 16GB to 2GB
Its overall file system size can range from 2 TB to 32 TB
2. Ext (third Extended File System)
Designed and developed in 2001 by Stephen Tweedie
Supported by Linux Kernel 2.4.15 ext3 and later Linux Kernel versions
It allows journaling, which is the main feature of Ext3, that provides dedicated
area where all changes are tracked thus reducing the possibility of system
crashes.
Its maximum individual file size can range from 16GB to 2 TB
Its overall ext3 system size can range from 2TB to 32 TB
An ext2 file system can be converted to ect3 file system directly (without the
need for backup/restore)
3. Ext4 (fourth Extended File System)
Developed in 2008
Supported since Linux Kernel 2.6.19 and later versions
Supports a large individual file size and overall file system size
Its maximum individual file size can range from 16GB to 16 TB
Its overall maximum file system size is 1 EB (Exabyte)
Its directory can include a maximum of 64,000 subdirectories
It can mount an existing ext3 f as ext4 fs without having to upgrade it
It features multiblock allocation, delayed allocation, journal checksum, etc.
It has the option of turning off the journaling feature
Worksheet 4.4
IDENTIFICATIONS:
___________1. A file system used by MAC OS to save files on hard disk, CD/DVD ROM discs,
and floppy disks.
___________2. A file system designed by Optical Storage Technology Association normally
used with CD/DVD drives.
___________3. A file system designed by Microsoft intended to be a replacement for NTFS.
___________4. A file system designed and developed by Remy Card in 1993
___________5. It contains the file name, file attributes, and pointers to fragments in NTFS.
___________6. It is the oldest type of FAT used on an 8-inch floppy disk.
___________7. It is the process of organizing and retrieving files from storage devices such
as a flash drive and hard drive.
___________8. It describes stored data in a file system
___________9. It is a file system initially developed for Windows NT and later utilized by
Windows XP, Windows 7, and Windows 8, as well as some version of the UNIX operating
systems.
___________10. It is a system of monitoring the content of storage devices used by older
Microsoft operating systems like DOS.
ACRONYM:
1. FAT _______________________________________
2. NTFS _______________________________________
3. ReFS _______________________________________
4. HFS _______________________________________
5. UDF _______________________________________
6. ext4 _______________________________________
7. exFAT _______________________________________
8. FS _______________________________________
9. MFT _______________________________________
10.ext2 _______________________________________
16
Lesson 4.5: Device Drivers
Most Essential Learning Competencies:
Duration :
Reference :
Author/s : Computer Assisted Learning Corporation
Values : Fortitude, Meekness, Industry
Concept
A device driver is a set of programs that enable hardware devices to interact with the
operating system. A hardware device would not function if the appropriate driver is not
installed on the computer system.
Ways of location Software Drivers
1. Determine the hardware
Make sure the Manufacturer and model of the hardware device are known before
searching for the device driver. Search for the driver(s) of the hardware device
connected to the computer and manufactured by an OEM (Original Equipment
Manufacturer). For computer manufacturers like HP, DELL, and Sony that use other
company’s part and sells it under it own brand name, look for the driver on the
OEM’s web page.
Popular Computer Manufacturers (OEM)
OEM LOGO DESCRIPTION
Alienware Manufacturer of high-end computers,
laptops, and gaming computers. The
company was purchased by Dell, which
continually supports the Alienware product
line.
Apple Apple is the main manufacturer of a line of
personal computers, peripherals, and
software under the Apple Macintosh
(Mac)brand name.
Acer America Established in 1977 as a subsidiary of the
Acer group; to date, the Acer group offers
a wide range of computer related products.
ASUS ASUS is one of the largest manufactures of
computers motherboards, laptop, tablets,
and other computer peripherals.
Dell Dell is one of the largest and fasted-
growing major computer companies in the
world that allows computers to order a
computer directly from the factory, as well
as from a retail electronics store.
Fujitsu Fujitsu is a Japanese company that makes
a wide of range of computer-related
products.
HP Hewllet-Packard is one of the world’s
largest computer peripheral companies
and the foremost producer of test and
measurement instrument.
IBM IBM is one of the most known and
successful computer companies of the
world.
Lenovo One of the world’s largest manufacturers
of computer and portable devices.
Toshiba Toshiba is manufacturer of computers, CD-
ROM drives, displays, laptops, hard drives,
and other computer and electrical
components.
Samsung Samsung was founded in 1938 and is the
manufacturer of computer products and a
wide range of other computer electronics
in other products.
Sony Sony is a manufacturer of electronics,
17
computer hard ware devices, such a
laptops, desktops, digital, cameras, and
more.
2. Download Location
The drivers of hardware devices of often listed on the manufacturer’s web page. If the
manufacturer of the hard ware device is already out of business, use third party
companies who specialize in offering obsolete divers.
2. Executable
Most computer hardware manufacturer prepackage their drivers into an executable file
or installs them on a setup file Double-click the setup or executable file to install the
drivers to the computer.
Worksheet 4.5
NAME: _________________________________ SCORE:
______
1. Enumerate and discuss the hardware device drivers needed to be installed on the
computer system.
2. Enumerate and discuss the different methods of installing drivers.
Types of Malware
19
1. Adware
Adware are programs designed to show advertisements on the computer, change a
user’s search requests to advertising websites, and to collect marketing-type data from
the computer about the kinds of website visited by its user. More than showing
advertisements and collecting data, Adware hide their presence from the computer
user. Normally, there no indications of the software being in the system tray and there
are no signs in the Start menu that Adware was installed on the computer.
2. Spyware
Spyware is a term used to refer to software that executes processes without the
consent o knowledge of the computer user.
Types of Spyware
Domestic Spyware- software that is normally installed by computers users to
keep track of the behavior of internet on their computers. Employers utilize this
software to keep track of the online activities of their employees. Parents may
also use this to monitor the activities of their children on the computer. Some
organization or individuals install domestic software without the consent of
knowledge of a computer user. Law enforcement officials use this software to
keep track of criminals while criminals also use this to collect and steal personal
information from private computers.
Commercial Spyware- software that organization use to monitor a computer
user’s browsing activities. Organizations that monitor online activities often sell
this information to marketers that send advertisement to computers users.
20
Multipartite virus- a hybrid of boot virus and program virus. It infects .exe files
so that when the program is executed, it infect the MBR. When the operating
system starts, the virus is loaded into the memory and is now free to infect
other programs and replicate itself.
Stealth virus- designed to avoid detection and uses different techniques to do
so. It redirects the hard disk head, making it read other memory sectors instead
of its own. It also changes the reading of the file size displayed in the directory.
Polymorphic virus- always changes its source code from one infection to
another. Each infection is different thus detecting it is very difficult.
Active X virus- because most users do not know how to setup ActiveX and Java
controls it leaves a potential security hole. Applets (or small applications) are
then permitted to execute on the computer that bring on ActiveX viruses.
5. Trojan
The Trojan is malicious software that does not replicate itself. The name was derived
from the mythical story of Greek soldiers who hid inside a giant wooden horse meant to
be a gift to the city of Troy. After dusk, the Greek soldiers opened the gates of Troy to
let in the rest of their army army and captured the city. The name is befitting because
this type of malicious software disguises itself as useful software. When trojan accesses
the system, it install or downloads other malware on the computer.
Types of Trojans
Password stealer- typically targets a specific type of password. The most
harmful password stealers are the following;
* Banker Trojans- collects banking credentials to steal money from a bank account
* Gamethief Trojan- steals account information from online games
* Trojan-IM- steals account information from instant messaging
* Key-logger Trojan- steals anything typed on the computer
21
Backdoor/RAT (Remote Access Trojan)- the most widespread type of Trojan; It is
designed to make the computer accessible to outside parties for several
purposes.
* Denial of service (DoS) attack- infect several computers in advance and makes
the infected computers attack the target computer at a time instructed by the
controller; Computers that are under control are referred to as botnets.
* Trojan Clicker- used to execute online actions to increase hit- counts
* Proxy Trojan- transform the target computer into a proxy so that operator of the
Trojan can execute online transactions anonymously
6. Rootkit
Rootkits are used to hide malware on the computer. Malicious software hidden by
rootkit monitors, filters, and steals data or exploits computer resources. A hacker
maintains his hidden presence on the computer by using rootkit. A better rootkit can
remain in a computer for years, If undetected.
8. Ransomware
Ransomware stops a user from using the computer, It holds the computer on files for
ransom. Examples of Ransomware are “FBI Moneypak” or the “FBI virus” because they
use FBI logos. Normally, most types of Ransomware prevent a user from using the
computer and asks the user to do something before he or she can use the computer.
Prevent a user from accessing Windows
Encrypt files so a user can’t use them
Stop certain apps from running such as web browser
Demand a user to pay money so he can access the computer
Demand the user to complete a survey
Worksheet 4.6
Fill in the Blanks
Write the correct answer on the space provided.
DISCUSSION:
1. What type of PUP is the most dangerous? Why?
2. Differentiate a Virus from Worm and Trojan.
3. In what way does a spyware become beneficial to an organization? How can it be
harmful to an individual user?
Files downloaded from the Internet like music, movies, games, etc. may have a virus,
Trojan or worm attached to them that can cause the computer to slow down, freeze, or
crash. Even the bandwidth of an organization’s network can be diminished by worms that
attack computers in a network. Computer security is very necessary to prevent the
infection by malware.
23
Phishing is the process of impersonating a business to trick someone into giving
their personal information. Credit card numbers and bank account numbers can be
used to steal money or open new accounts in someone’s else name. Be careful
when answering questions asking for personal information whether in web form, an
email, text, or phone message. Phishers will do everything to appear trustworthy to
their intended victims.
3. Check Out Companies to Find Out Who You are Really Dealing With
If an advertisement of an offer looks too good, take time to check out the company
behind it. Search for the profile of the company or the product name and append
terms like “complaint,” “review,” or “scam” in the search box of a web browser. If
bad reviews appear, decide if the offer is worth the risk. If there is no contact
information provided for the company it is best to decline the offer. Keep in mind
that not all advertisement, even on a reputable site, is trustworthy. Though a site
may feature an ad for another site, it does not necessarily mean that it endorses
the advertised site is or is even familiar with it.
5. Protect Passwords
Create strong passwords to keep them safe;
The longer the password, the toucher it is so crack. It is best to use a minimum
of 10 characters.
Mix letters, numbers, and special characters. Do not use names, birthdates, or
common words,
Do not use the same password for multiple accounts.
Do not share passwords over the phone, by text or by email.
If written, keep passwords in a secure place, out of plain sight
6. Back Up Files
No computer system is completely secure. Copy important files onto a
removable disk or into an external hard drive and store it in a safe place.
Keep security software updated. The computer should have anti-virus and anti-
spyware software as well as a firewall set up. Set the security software, Internet
browser, and operating system to update automatically.
Type the URL of the site directly into a browser instead of clicking on a link in an
email. Cyber criminals often send emails that appear to be from reputable
companies. The links may look real, but clicking on them could download
malware or send a bogus site designed to steal personal information.
Do not open attachment in emails sent by strangers. Opening attachments in
emails that seem to be from friends or family can inject malware onto the
computer.
Download and install software only from known and trusted websites.
Downloading free games, file-sharing programs, and customized toolbars may
come with malware.
24
Minimize “drive-by” downloads. Make sure the browser security setting is high
to detect unauthorized downloads.
Use a pop-up blocker and do not click on any links within pop-ups. Close pop-up
windows by clicking on the “X” in the title bar.
Resist buying software in response to unexpected pop-up messages or emails,
especially advertisements that claim to have scanned the computer and
detected malware.
Discuss safe computing with children. Tell the children that some online
activities can place the computer at risk like downloading “free” games or
programs, clicking on pop-ups, posting personal information, or opening chain
mails.
Back up data regularly. Backing up data is necessary in case the computer
crashes.
Cybercrime
The Internet brings the world closer thus creating a smaller place where computers users
communicate and interact. But, it also creates a big problems for users who spend long
hours surfing the World Wide Web. Cybercrimes are steadily growing and many users have
been victimized by malicious software, hacking, and identity left. The following are the
common types of cybercrimes.
1. Cyber Stalking- a type of harassment on the Internet where the victim is attacked
by a barrage of email and online messages. In this case, cyber stalkers usually
knows their victims and use the Internet to stalk them.
2. Hacking- a kind of cybercrime where a computer is accessed without proper
authorization from the user in order to acquire sensitive information. The
cybercriminal uses different software to break into a user’s computer and the user
is not aware that the computer was already accessed from a remote location.
3. Malicious software- Internet-based applications or programs that are used to
destroy a network. The software is used to access a system in order to steal
sensitive information and cause damage to software installed on the system.
4. Theft- occurs when a cybercriminal ignores or breaches copyright and downloads
movies, games, music, and software. Peer sharing websites that propagates
software piracy are under investigation by authorities.
5. Child solicitation and abuse- a kind of cybercrime wherein cybercriminals seek
minors through chat rooms for child pornography. Authorities have been tracking
chat rooms frequented by children for the purpose of preventing child solicitation
and abuse
6. Identity theft- a serious problem with users who hold cash transaction and banking
services over the Internet. A cybercriminal accesses data about a person’s bank
account, credit cards, debit card and other sensitive information to transfer money
or to purchase things online in the victim’s name.
Worksheet 4.7
DISCUSSION
1. Enumerate and discuss some of the steps in securing computers.
2. Discuss the common types of cybercrimes.
3. In your own way, how can you prevent cybercrime?
25