Nothing Special   »   [go: up one dir, main page]

Q1W3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Computer Language

Arts 4
Q1W3
Write True if the statement is correct,
then False if not.

1. Computers are used in different


ways.
2. Computers are used only in schools.
3. Traffic lights are controlled by a
computer.
Write True if the statement is correct,
then False if not.

4.Film creators may use computers for


animation.
5.Hospitals use computers to diagnose
the illness of a person.
Computer Threats

Malware is short for malicious software.


It is a code created with malicious intent. It is
designed to damage, destroy, steal, or inflict
bad action on data, hosts, or networks.
Computer Threats

There are many types of malware, but in this


lesson, we will discuss viruses, worms, and Trojans.
These can be bundled with other programs or attached
as files. The majority of these are installed by selecting
an email attachment or downloading a file from the
Internet.
Types of Malware

1. Computer Virus
It is a type of malware that propagates by
inserting a copy of itself and becoming part of
another program.
Types of Malware

It spreads from one (1) computer to


another, leaving infections as it travels. Some
viruses overwrite other programs with copies
of themselves that destroy the host program
altogether.
Types of Malware

2. Computer Worms
It is like a computer virus in the sense that
it replicates copies of itself and causes the
same type of damage.
Types of Malware

3. Trojan
It is another type of malware that was
named after the wooden horse that the Greeks
used to infiltrate the city of Troy.
Types of Malware

3. Trojan
It is a software that looks real, but it
activates and attacks the host when loaded. It
irritates the user with pop-ups, deletes files,
steals data, and spreads viruses.
Easy Steps to Prevent Computer Threats from
Infecting your Devices:

1. Install anti-virus software and keep it up to


date: it usually prevents the device from
known viruses.
Easy Steps to Prevent Computer Threats from
Infecting your Devices:

2. Never open email links that you do not


trust.
3. Be careful when opening graphics or media
files.
Easy Steps to Prevent Computer Threats from
Infecting your Devices:

4. Download applications from official stores


for smartphones and tablets.
5. Minimize downloads.
Easy Steps to Prevent Computer Threats from
Infecting your Devices:

6. Always back up your data onto a storage


device.
Self Answer the crossword puzzle
Check about computer malware.
1. stand-
alone
malware
2. malware
named after
a Greek
wooden
horse
3. short for
malicious
software
4. it spreads
by copying
itself and
attaching to
other
programs
LET’S PRACTICE

Answer the following questions.

1.How do we keep ourselves healthy while using a


computer?
2. What are we going to do when our gadgets have
been infected by viruses?

You might also like