Professional Documents
Culture Documents
TLE/TVL-ICT
(Computer Programming Java)
Activity Sheet
Quarter 2 – LO 5
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Reviewer/Editor:Edward E. Baña
Layout Artist:
2
Introductory Message
Welcome to Computer Programming Java Grade 12
The Computer Programming Java Technology Activity Sheet will help you
facilitate the leaching-learning activities specified in each Most Essential Learning
Competency (MELC) with minimal or no face-to-face encounter between you and
learner. This will be made available to the learners with the references/links to ease
the independent learning.
3
Learning Activity Sheets (LAS)
(For Computer Programming Java Technology)
4
Utility Software(n.d.). Retrieved from www.tutorialspoint.com:
https://www.tutorialspoint.com/basics_of_computers/basics_of_computers_utility
_software.htm
What to Secure?
1. Check the physical security by setting control systems like motion
alarms, door accessing systems, humidity sensors, and temperature
sensors. All these components decrease the possibility of a computer to
be stolen or damaged by humans and environment itself.
2. People having access to computer systems should have their own user
ID with password protection.
3. Monitors should be screen saver protected to hide the information from
being displayed when the user is away or inactive.
4. Secure your network especially using wireless connections. Password
should be used.
5. Internet equipment as routers to be protected with password.
6. Data that you use to store information which can be financial, or non-
financial by encryption.
7. Information should be protected in all types of its representation in
transmission by encrypting it.
Potential Losses due to Security Attacks
Losing you data − If your computer has been hacked or infected, there is a
big chance that all your stored data might be taken by the attacker.
Bad usage of your computer resources − This means that your network or
computer can go in overload so you cannot access your genuine services or in a
worst scenario, it can be used by the hacker to attack another machine or
network.
Reputation loss − Just think if your Facebook account or business email has
been victimized by a social engineering attack and it sends fake information to
your friends or business partners. You will need time to gain back your
reputation.
Identity theft − This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making
false identity documents.
Basic Computer Security Checklist
There are some basic things that everyone of us in every operating system need
to do:
Check if the user is password protected.
Check if the operating system is being updated.
Check if the antivirus or antimalware is installed and updated.
5
Check for the unusual services running that consumes resources.
Check if your monitor is using a screen saver.
Check if the computer firewall is on or not.
Check if you are doing backups regularly.
Check if there are shares that are not useful.
Check if your account has full rights or is restricted.
Update other third party software’s.
Virus/Malwares
A virus can be defined as a malicious program that attaches itself to a host
program and makes multiple copies of itself, slowing down, corrupting or
destroying the system. They are self-replication programs that reproduce their
own codes by attaching themselves to other executable codes. They operate
6
without the permissions or knowledge of the computer users. Viruses or
malwares like in real-life, contaminate other healthy files in a computer.
However, we should remember that viruses infect outside machines only with
the assistance of a computer user. These can happen by clicking a file that
comes attached with email from an unknown person, plugging a USB without
scanning, opening unsafe URLs for that reason. We as system administrators
have to remove the administrator permissions of users in these computers. We
categorize malwares in three types:
Trojans and Rootkits
Viruses
Worms
Characteristics of a Virus
They reside in a computer’s memory and activates themselves while the
program that is attached starts running.
For example − They attach themselves in general to the explorer.exe in
windows OS because it is the process that is running all the time, so you should
be cautious when this process starts to consume too much of your computer
capacities.
They modify themselves after the infection phase like they source codes,
extensions, new files, etc. so it is harder for an antivirus to detect them.
They always try to hide themselves in the operating systems in the following
ways −
o Encrypts itself into cryptic symbols, and they decrypt themselves when they
replicate or execute.
Some Practical Recommendations to Avoid Viruses
Don’t open any email attachment coming from unknown people or from
known people that contain suspicious text.
Don’t accept invitation from unknown people on social media.
Don’t open URL sent by unknown people or known people that are in any
weird form.
Antivirus
A software that assists the OS in providing virus free environment to the
users.An anti-virus scans the system for any virus and if detected, gets rid of it
by deleting or isolating it.
7
Free Antivirus Software
Examples of Free Antivirus Software:
1. Avast Antivirus – is good in malware blocking and anti-phishing test scans.
2. AVG Antivirus
3. Panda Antivirus 2016 - It has the following good features: Rescue Disk,
USB protection, and Process Monitor
4. Bitdefender Antivirus - A good feature in this antivirus is that it can work
entirely in the background. No configuration setting.
5. Microsoft Security Essentials – Microsoft’s free antivirus
Commercial Antivirus
Based on PC magazine, the best commercial antiviruses are:
Kaspersky Anti-Virus
Bitdefender Antivirus Plus 2016
McAfee AntiVirus Plus (2016)
WebrootSecureAnywhere Antivirus (2015)
Compression Tools
8
Storage space is always at a premium in computer systems. So operating
systems are always looking at ways to minimize amount of storage space taken
by files.
Compression tools are utilities that assist operating systems in shortening files
so that they take less space. After compression files are stored in a different
format and cannot be read or edited directly. It needs to be uncompressed
before it can be accessed for further use. Some of the popular compression
tools are WinRAR, PeaZip, The Unarchiver, etc.
Disk Cleanup
Disk cleanup tools assist users in freeing up disk space. The software scans
hard disks to find files that are no longer used and frees up space by deleting
them. Examples of disk cleanup tools are CC Cleaner, Glary Utilities, etc.
Disk Defragmenter
Disk defragmenter is a disk management utility that increases file access
speeds by rearranging fragmented files on contiguous locations. Large files are
broken down into fragments and may be stores in non-contiguous locations if
contiguous ones are not available. When such files are accessed by the user,
access speed is slow due to fragmentation. Disk defragmenter utility scans the
hard disk and tries to assemble file fragments so that they may be stored in
contiguous locations.
Backup
Backup utility enables backing up of files, folders, databases or complete
disks. Backups are taken so that data may be restored in case of data loss.
Backup is a service provided by all operating systems.
Why is Backup Needed?
The main purpose is to recover the lost data from an unpredictable event
like deletion by mistake or file corruption which in many cases is caused by a
virus.
An example is Ransomware, which encrypts all your data when your
computer gets infected and the second is to roll back the data at a specific time
you want. This is a scenario that happens often in companies which have
applications and databases and they want to test their applications with a
specific version of data.
Backup Devices
CD and DVD, Blue-Rays
Removable Devices
Network attached storage (NAS) − They are generally devices that are used in
small businesses for backup purposes because they offer a centralized manner
of backup.
Storage Area Network (SAN) − These are generally devices that are used for
big businesses for backup purposes. They offer a high speed of network for
storage the biggest producers are EMC Corporation, DELL.
9
2. Exercises / Activities
2.1. Directions: Choose the letter of the correct answer. Write your answers on a separate
sheet of paper.
1. These are self-replication programs that reproduce their own codes by attaching
themselves to other executable codes.
a. Defragmenter b. Virus c. Antivirus d. Defender
2. What software assists the OS in providing virus-free environment to the users?
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
3. A software used to create, delete, modify, and control access and save files.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
4. A utility software that increases file access speeds.
a. Disk Defragmenter c. Archiver
b. WinRAR d. Cleaner
5. These tools assist users in freeing up disk space.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Backup Utility
6. The following are losses due to security attacks, EXCEPT.
a. Losing Data or Information c. Identity Theft
b. Bad usage of computer resources d. Plagiarism
7. A free antivirus that is good in malware blocking and anti-phishing test scans.
a. Avast b. AVG c. Panda d. Bitdefender
8. The process of detecting and preventing any unauthorized use of your computer.
a. Computer Maintenance c. Computer Security
b. Computer Repair d. Computer Organization
9. What do you call a person who tries and exploits the computer system for a purpose.
a. IT Personnel b. Web Experts c. Software Engineer d. Hacker
10. The following are basic functions of Antivirus, EXCEPT.
a. Scanning b. Phishing c. Integrity Checking d. Interception
2.2 Using your Mobile Phone or Computer (if available), open the browser (Mozilla Firefox
or google chrome) and open the link provided. Watch the YouTube video of disk
defragmentation.
https://www.youtube.com/watch?v=AtRIOUZuI2c
10
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. What significant values have you developed while doing your activity/output?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Multiple Choice
1. b
2. d
3. a
4. a
5. c
6. d
7. a
8. c
9. d
10.b
11