You are on page 1of 2

LEARNING PLAN

GRADE 10
UNIT TOPIC: Unwanted Software

UNIT STANDARDS
CONTENT STANDARD
The learner will be familiar with unwanted software can be determined through the unwanted behaviour, advertising
and privacy.

PERFORMANCE STANDARD
The learner will apply the technology used eliminate malicious software (malware).

LEARNING COMPETENCIES
1. Identify the unwanted software that invades computer systems.
2. Secure computers from threats posed by any malicious or unwanted software.
3. Develop the necessary actions and careful judgments to secure files and computer programs.

LEARNING TARGETS
At the end of the lesson, the learner will be able to:
1. Identify the types of Malicious software
2. Perform an action to secure their files and computer programs.
3. Differentiate the all the malicious software
EXPLORE
The teacher will group the class into five groups and each group are provided with pictures of different
malicious software, then the group will discuss the picture/s and after that they will name the malicious software
according to the pictures, and the group that gets the correct answer will be the winner.

FIRM UP
UNWANTED SOFTWARE
An unwanted software can be determined through the following

 Unwanted behaviour
 Advertising
 Privacy
POTENTIALLY UNWANTED PROGRAMS (PUPs)
- Are pieces of software that a computer user may want to be notified about the subsequently remove them
from the computer.
MALICIOUS SOFTWARE (MALWARE)
- Manifests installation , surveying, replication, concealment, injection and payload behaviour.

TYPES OF MALWARE
 Adware – are programs designed to show advertisements on the computer, change a user’s search
requests to advertising websites and to collect marketing type data from the computer about the kinds of
websites visited by its users.
 Spyware – is a term used to refer to software that executes processes without the consent or knowledge of
the computer user.
 Vital Information Resources Under Siege (VIRUS) – are small programs customized to spread one
computer to another and also to disrupt computer operations.
 Write Once Read Many (WORM) – is similar to a virus but it does not need a host program to attach
itself to.
 Trojan – is malicious software that does not replicate itself and disguises itself as useful software.
 Rootkits - are used to hide malware on the computer by monitoring, filtering and stealing data or
exploiting computer resources.
 Rogue security software – it looks to be helpful for the security of computer but instead gives limited or
no security at all.
 Ransomware – stops a users from using a computer, as it holds the computer or files for ransom.

DEEPEN
With the same group, the teacher will as the group of students to enumerate the types of malware and the
affects or problems that they can cause to the computer system.

TRANSFER

You might also like