You are on page 1of 13

SPECIAL PROGRAM IN TECHNICAL VOCATIONAL

EDUCATION (SPTVE)

ICF 9
Internet and Computing
Fundamentals

Quarter 4 – Week 5-6

The Risk of Computing

Understanding Viruses
MODULE 4 Using the Internet
Week 5 The Risk of Computing

What I need to know?


1. Define hacker, ergonomics , power surge, outage, spikes
2. discuss ways on how to protect your computer system
3. Identify the importance of having safe working environment

What Is It?

Keeping your computer secure helps


you avoid malware and direct hacking
attempts designed to steal your
personal information. Here are some
ways you can help reduce your online
risk when you use your computer at
home.

Protecting Your Data or Computer from these factors below:

Theft Many steps one can take to protect computer equipment against theft.
Damage Same common sense rules apply as for any other equipment regarding
physical damage.
Data Loss Losing data can occur through hackers, hardware failure, power spikes,
accidental deletions, or disgruntled employees.
Backups Data should be backed up regularly and backup copies stored in another
location.
Power Vulnerable to two kinds of power problems: outages and surges

A power surge is an abnormally high voltage lasting for a short period of time. A power
surge is a transient wave of voltage, current or power in an electrical circuit. ... This is
usually an oversupply of the voltage from a source such as mains supply or generator and
lasting only for a few microseconds.
A power outage is a short- or long-term state of electric power loss in a given area or
section of a power grid. It could affect a single house, building or an entire ...
Power Spike: In electrical engineering terms; power spikes are intense electrical transients
in voltage, current, or transferred energy in an electrical circuit lasting only a few milliseconds
and travelling 16.896 million feet per second. Power spikes can contain very high voltages –
typically 3000 kilowatts. At that speed and intensity, a spike shoots through the average
surge protector long before its resistor has time to melt and stop the current flow.

Spikes are typically caused by: Lightning strikes, Tripped circuit breakers, Short circuits,
Power Line Issues

Tips to protect your computer

▪ Use a firewall
Windows 10 and Windows 8 have a firewall already built in and automatically turned on.
▪ Keep all software up to date
Make sure to turn on automatic updates in Windows Update to keep Windows, Microsoft
Office, and other Microsoft applications up to date. Turn on automatic updates for non-
Microsoft software as well, especially browsers, Adobe Acrobat Reader, and other apps you
regularly use.
▪ Use antivirus software and keep it current
If you run Windows 10 or Windows 8, you have Windows Security or Windows Defender
Security Center already installed on your device.
▪ Make sure your passwords are well-chosen and protected
To learn how, see Protect your passwords.
▪ Don’t open suspicious attachments or click unusual links in messages.
They can appear in email, tweets, posts, online ads, messages, or attachments, and
sometimes disguise themselves as known and trusted sources.
▪ Browse the web safely
Avoid visiting sites that offer potentially illicit content. Many of these sites install malware on
the fly or offer downloads that contain malware. Use a modern browser like Microsoft Edge,
which can help block malicious websites and prevent malicious code from running on your
computer.
▪ Stay away from pirated material
Avoid streaming or downloading movies, music, books, or applications that do not come from
trusted sources. They may contain malware.
▪ Do not use USBs or other external devices unless you own them
To avoid infection by malware and viruses, ensure that all external devices either belong to
you or come from a reliable source.

Protect your personal information online


Your privacy on the internet depends on your ability to control both the amount of personal
information that you provide and who has access to that information.

Protect yourself from scams


When you read email, use social media, or browse the web, you should be wary of scams
that try to steal your personal information (also known as identity theft), your money, or both.
Many of these scams are known as "phishing scams" because they "fish" for your
information. Find out how to protect yourself from phishing scams and avoid tech support
scams.
Prevent and remove malware
One important step toward greater workplace security is to protect your computer against
malware.
Malware is the collective name for a number of malicious software variants, including
viruses, ransomware and spyware. Shorthand for malicious software, malware typically
consists of code developed by cyber attackers, designed to cause extensive damage to data
and systems or to gain unauthorized access to a network.

Windows Security

Windows Security (or Windows Defender Security Center in previous versions of Windows
10) is built in to Windows 10 and Windows 8 and provides real-time malware detection,
prevention, and removal with cloud-delivered protection. It is intended for home, small
business, and enterprise customers.

Understanding Data Security


 Data usually worth more as it represents work done
 Hacker is someone who gets unauthorized access to:
– steal information to sell
– destroy information
– change information
– use workstation, either physically or online
 Important technique to protect data is with passwords
– limit access to critical information
– use logical but less obvious words
– use combination of letters and numbers
– change regularly
– if worried about having too many, alternate between few, and keep in safe
location
– use different password for confidential files
– check about casing

Establishing a Safe Working Environment


 General occupational health and safety principles apply in computerized work
environment
 Need to avoid injury due to fire, electrical shock, chemical injury and physical injury
 Some measures to ensure safe environment include:
– Avoid temporary setups for computer as they tend to last much longer than
intended
– Ensure CPU is positioned somewhere stable, and ample space behind CPU for
air circulation
– Use power bar to connect computer to power outlet
– Protect yourself and others from accidentally tripping on any cables by keeping
them neat and out of the way

Using Ergonomics
 Ergonomics, or human factor engineering, is the study of the human in the workplace
 Studies identified three particular areas of concern:
– In wrist, all nerves and blood vessels pass through narrow tunnel in wrist bones
called carpal tunnel; repeated stress in this area causes painful inflammation
(carpal tunnel syndrome), or repetitive motion injury (RMI)
– A similar situation can arise at elbow joint
– Sitting for extended periods on incorrect seating constricts blood flow in legs
and applies pressure on nerves

Using Ergonomics
Looking at Workstation Ergonomics
1. Monitor and keyboard should be straight in front of you.
2. No glare or reflections on screen.
3. Place any documents in document holder next to monitor.
4. Work surface should be stable.
5. Once seated comfortably, wrists should be straight and flat.

6. Top of monitor should be about 2-3″ above eyes.


7. Arms and elbows should be close to body.
8. Use good, adjustable ergonomic chair.
9. Feet should be flat on floor when seated comfortably.
10. Remember to take regular breaks.

Preventing Eye Strain


Viewing Distance Monitor should be at comfortable horizontal distance for viewing.
Screen Quality Good quality monitor can reduce eye strain.
Bifocal/Progressive Lens Should be able to see screen without tilting head back or craning
forwards.
Proper Lighting Natural light is always better. Lighting should be above or behind you,
facing onto monitor.
Eye Checkup If experiencing eye strain, consult eye professional.
Rest When you take break, remember to look in the distance.
Using Notebooks
 Notoriously non-ergonomic because screen and keyboard are attached
 If casual user, then sit comfortably in chair and place notebook on lap such that hands
are in comfortable horizontal position and tilt screen for minimum bending of neck.
 If full-time user, consider getting separate keyboard and mouse in location where
predominantly work.
 Notebooks may not seem heavy, but they can cause strain if carried for long distances

What have I learned ?


Directions: Answer the following questions on the space provided.

1. What are the ways of protecting your computer system ?


2. Can you define power surge, power outage and power spikes? Cite the differences.
3. How ergonomics help you while working?

What I Can Do ?

Activity 1: Read and identify the correct answer for each statement below:

Phishing scam Ergonomics Hacker

Power surge Power outage

1. someone who gets unauthorized access


2. a short- or long-term state of electric power loss in a given area
3. the study of the human in the workplace
4. an oversupply of the voltage from a source such as mains supply
5. steal your personal information your money, or both known as identity theft.

Activity 2: True or False: Write word True if the statement is correct and False if otherwise.

1. Repeated stress in this area causes painful inflammation is Bipolar syndrome.


2. Good quality monitor can reduce eye strain.
3. Your privacy on the internet depends on your ability to control both the amount of personal
information that you provide and who has access to that information.
4. Use antivirus software which is outdated.
5. Power spikes can contain very high voltages – typically 3000 kilowatts.
Assessment

Multiple Choice: Read the sentences below and write the correct letter of your choice.
Use a separate paper for your answer.

1. Among the given answers, which one is not the purpose of a Hacker.
A. steal information to sell C. change information
B. destroy information D. ignore the information
2. To avoid eye strain proper lighting is important. Which one is best to observe?
A. Work at midnight with full lightings. C. Natural light is always better.
B. Lighting should be above or behind you. D. Always dim your monitor lightings.
3. Top of monitor should be about ________above eyes.
A. 1-2 “ B. 2-3” C. 3-4” D. 4-5”
4. An intense electrical transients in voltage, current, or transferred energy in an electrical
circuit. What power is referred to?
A. Outage B. Spark C. Spike D. Surge
5. Jorge is accessing office information without asking permission. What do you call him?
A. Hacker B. Surfer C. Stealer D. Worker
6. To avoid muscle stress and body pain while working with the use of computer one should
consider proper human factor engineering. Which of following should be practiced.
A. Tolerate a glare or reflections on screen.
B. Feet should be lifted on floor when seated .
C. Once seated comfortably, wrists should be straight and flat
D. Insufficient lighting should be above or behind you, facing onto monitor.
7. Eliminating theft is a major problem to do, one way to protect your laptop and your
software is to:
A. Purchase insurance protection.
B. Increase building security.
C. Padlock computers to desks/per location.
D. Use password to prevent access to software.
8. It consists of code developed by cyber attackers, designed to cause extensive damage to
data and systems or to gain unauthorized access to a network.
A. Browser B. Cookies C. Malware D. Scam

9. To effectively protect your system and data, one must adhere to safety tips except for:
A. Use a firewall C. Use antivirus software and keep it current
B. Stay away from pirated material D. Open suspicious attachments or unusual
links in messages.
10. Important technique to protect data is with passwords. What a strong password should
be made of?
A. birthday date C. obvious nickname
B. letter and numbers D. complicated casing

REFERENCE
ICF 9 MODULE – LIVING ONLINE
www.google.com
MODULE 4 Looking at the Internet
TOPIC 6 Understanding Viruses

What I need to know?

At the end of the lesson, the students should be able to :

1. Identify the features and types of a computer virus


2. discuss the importance of anti virus program
3. list down the tips on how to protect system from viruses

What Is It?
A computer virus is a type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code. If this replication succeeds, the affected areas are then said
to be "infected" with a computer virus. Computer viruses generally require a host program.
Damage is due to causing system failure, corrupting data, wasting computer resources, increasing
maintenance costs or stealing personal information. Even though no antivirus software can uncover all
computer viruses (especially new ones), computer security researchers are actively searching for new ways
to enable antivirus solutions to more effectively detect emerging viruses, before they become widely
distributed.
2 Phases of Virus
1, Infection phase – the virus cling to infect files and programs
2, Attack phase – in its way for destruction

Understanding Viruses
Only one way virus can infect compute— you let it in!

 All viruses come into computer


on disks or files put into
computer from e-mail
attachments, or downloading
from network or the Internet
 Virus can cause just as much
damage on any type of system
that contains data
 Virus is computer program able
to move from computer to
computer by attaching itself to
other program files
 Many recent viruses not
destructive viruses per se, but
meant to cause problems by making networks crash due to volume of messages
being handled by network
 New virus programs being created every day
 There are many hoaxes designed to cause network traffic problems through panic
notifications

Looking at the Types of Viruses

1. File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host files
and others can damage your hard drive’s formatting.
2. Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
4. Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code on
a website and insert links that can install malicious software on your device. Web scripting
viruses can steal your cookies and use the information to post on your behalf on the infected
website.
5. Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks. Today,
these viruses are found distributed in forms of physical media such as external hard drives or
USB. If the computer is infected with a boot sector virus, it automatically loads into the
memory enabling control of your computer.
6. Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
7. Resident Virus
A resident virus stores itself on your computer’s memory which allows it to infect files on your
computer. This virus can interfere with your operating system leading to file and program
corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily spread on your computer system. It can
infect multiple parts of a system including memory, files, and boot sector which makes it
difficult to contain.

 Some other malicious viruses that exist, although not actually a virus
 Two most common types are:
 Worms - virus programs that duplicate or replicate themselves through some
means
 Trojan Horses - written to be “hidden” and appear harmless
Manifestations of a Virus
on the system

 See messages,
prompts, or displays
never saw before
 Computer seems to
run lot slower or
problems with
programs suddenly
appear
 Certain software
applications no
longer work
 Hear sounds or
music never heard
before and occur
randomly
 Names of disk,
volumes, or files changed
 Computer seems to contain lot more or less files than before
 See lot of error messages indicating file is missing
 Get messages with attachments from people you don’t know

Performing a Data Backup

 Data can be lost as result of power problems, computer breakdown, theft or hacking
 Backup is when you save your data elsewhere as well as regular folder or hard drive.

What have I learned ?


Directions: Answer the following questions on the space provided.

1. What is a Computer Virus? Can you cite its manifestations?


2. How will you protect your computer from viruses?
3. Can you label the types of virus? How does it exist?

What I Can Do ?
Activity 1: Identify the sentences if it is a manifestations of virus existence. Pick out the correct
answer by writing its letter.

A. See messages, prompts, or displays never saw before


B. Computer seems to run lot slower or problems with programs suddenly
appear
C. All software applications work smoothly
D. Hear sounds or music never heard before
E. Names of disk, volumes, or files changed
F. Computer seems to contain lot more or less files than before
G. See lot of messages indicating file is missing
Assessment
MULTIPLE CHOICE: Read the statements carefully and write the letter of the correct answer on your answer sheet.

1. A type of computer program that, when executed, replicates itself by modifying other
computer programs and inserting its own code.
A. Browser B. Spam C. Scam D. Virus

2. This virus can interfere with your operating system leading to file and program corruption.
A. Boot Sector B. Multipartite C. Resident D. Worms

3. A type of virus that is very infectious and can easily spread on your computer system.
A. Boot Sector B. Multipartite C. Resident D. Worms

4. It automatically loads into the memory enabling control of your computer.


A. Boot Sector B. Multipartite C. Resident D. Worms

5. It is also called a parasitic virus which typically infects files with .exe or .com extensions.
A. File B. Multipartite C. Resident D. Trojan

6. The antidote program used to protect system from viruses.


A. Anti-virus B. Filter C. Firewall D. Password

7. Data can be lost as result of power problems, computer breakdown, theft or hacking, to
avoid these, one should have a ___________.
A. Anti-virus B. Back-up C. File cabinet D. RAM Storage

8. What are the possible effects can be done by a virus?


A. Damage files and programs C. Save the information
B. Run the system smoothly D. Seem to be problem free

9. Has the capability to evade anti-virus programs since it can change codes every time an
infected file is performed.
A. Polymorphic B. Multipartite C. File D. Boot sector

10. It is the stage wherein virus are kept on attaching from one file to another.
A. Attack B. Execution C. Infection D. Propagation

REFERENCE
ICF 9 MODULE – LIVING ONLINE
google.com/ Wikipedia.com
www.nibusinessinfo.com
KEY ANSWER

Week 5

Activity 1:
1. Hacker
2. Power outage
3. Ergonomics
4. Power surge
5. Phishing scam

Activity 2:
1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Assessment

1. D 6. C
2. C 7. D
3. B 8. C
4. D 9. D
5. A 10. B

Week 6

Activity 1: A,B,D,E,F,G

Assessment:

1. D
2. C
3. B
4. A
5. A
6. A
7. B
8. A
9. A
10. C

MA. RUBY P. LEDESMA


Teacher III, TVE Dept.- DMLMHS
The Writer

Published: October, 2020

You might also like