Professional Documents
Culture Documents
Com8 Q4M1
Com8 Q4M1
QUARTER 4 MODULE 1
LEARNING OBJECTIVES
Name:
Year and Section:
1
CAN YOU FIND ME?
DIRECTION: Find the following words in the puzzle.
MALWARE SPYWARE DETECT
VIRUS PHISHING SCAN
ANTIVIRUS PHARMING
ADWARE RANSOMWARE
R A N S O M W A R E
K P V I R U S Z X A
A C H V B N C M Q N
D K M A L W A R E T
W L H F R D N A S I
A Z C B X M Y O I V
R P H I S H I N G I
E Q W N M K L N J R
D D E T E C T J G U
F S P Y W A R E G S
2
• Phishing: Seemingly safe links take users to
malicious sites that gather personal data and
login credentials, and can be found within
websites, emails or even ads
• Pharming: Similar to phishing attacks,
pharming attacks redirect users from a
legitimate site to a malicious one
• Ransomware: When downloaded,
ransomware blocks access to files and
programs until users pay a set fee
3
WHAT ARE THE FEATURES TO LOOK FOR IN AN
ANTIVIRUS SOFTWARE?
There are many options to weigh when shopping for virus protection. This is a list of
features to look for in a security suite:
4
NOTE:
KINDLY REATTACHED THIS PAGE AND SUBMIT THE ACTIVITIES ONLY. KEEP THE
REMAINING PAGES FOR YOUR COPY.
ACTIVITY 1
Direction: Choose the letter of the correct answer.
1. It is a harmful software that replicates itself and spreads itself to other devices.
a. adware c. virus
b. spyware d. ransomware
2. A type of program designed and developed to protect computers from malware
like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such.
a. malware c. antivirus software
b. virus d. ransomware
3. This type of malware generates ads and tracks behavior.
a. virus c. ransomware
b. adware and spyware d. phishing
4. When downloaded, this malware blocks access to files and programs until users
pay a set fee.
a. virus c. adware and spyware
b. antivirus d. ransomware
5. Seemingly safe links take users to malicious sites that gather personal data and
login credentials, and can be found within websites, emails or even ads.
a. adware c. pharming
b. phishing d. ransomware
ACTIVITY 2
Direction: Complete the table below.
1. VIRUS
3. PHISHING
4. PHARMING
5
5. RANSOMWARE
ACTIVITY 3
Direction: Answer the following.
1. In your own understanding, what is an antivirus software?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
2. Give at least 5 benefits of antivirus software.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
3. In your own opinion, is antivirus software important? why?
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
RESOURCES
https://ae.norton.com/internetsecurity-how-to-how-to-choose-antivirus-
software.html
ANSWER KEY
1. C
2. C
3. B
4. D
5. B
PREPARED BY:
JOSHUA B. ORAIS
Student teacher