Computer System Servicing 1 NC-II MODULE 7C (Second Semester: Week 5)
Computer System Servicing 1 NC-II MODULE 7C (Second Semester: Week 5)
In the Last Module we have discussed the different Application Software including the types of it and
their functions. We also discussed the difference of Licensed and Freeware.
MALWARE
Malicious Software or Malware are software that were created to inject destructive/intrusive code to a
software that causes harm to a computer.
Effects of Malware:
1. Slows down performance
2. Crashes Registry files
3. Crashes or corrupts Software
4. Corrupts files
5. Can Crash/Corrupt an OS
6. Can be used to hack your sensitive info
7. Prevents you from accessing your files.
TYPES OF MALWARE
1. Virus
2. Worm
3. Trojan Horse
4. Spyware
5. Adware
6. Bloatware
7. Ransomware
Virus
Malware that is coded to harm a computer. The first malware created. Needs a user intervention to
spread/activate.
Worm
Malware that is less destructive but spreads fast w/o user intervention and is very persistent and hard to
wipe out.
Worm has a habit of returning even if it is deleted. Intense malware removal is needed.
Trojan Horse
A destructive malware. It attacks unknowingly via backdoor method. Attached to a “good” software.
Taken from the symbolic figure from History the Trojan Horse.
Spyware
Malware that once it infiltrated your computer it will store all sensitive information like passwords, bank
credentials, etc. to the hacker.
Adware
Not really harmful but some “Ads” are maliciously coded to contain other malwares that will be
downloaded to the computer once it is clicked. Can be found in the internet only.
Bloatware
Malware that is useful sometimes but consumes “large” amounts of space in a hard disk. Sometimes it’s
a software that you don’t really need and takes up unnecessary space.
Ransomware
The latest malware and one of the most dangerous right now. It can encrypt your files with a password
or a program that prevents you from accessing it. You will be directed to a website to pay in order for
you to gain access to the files. Your files were taken as hostages for ransom hence its name.
Ransomware can be false positive alert wherein you were to be notified that your computer is infected
or your files are encrypted.
1. What is a Malware?
2. Give Three Types of Malware and briefly describe them.
3. What makes the Worm Malware difficult to deal with?
4. Why is Ransomware considered a destructive malware?
5. Give Three ways how malware can spread
6. Give Three Possible effects of Malware in a computer
File Types
1. Archive Files – this are the files that are opened, edited, and created by Archivers Software.
• 7z – Archive file used by the software 7zip
• BIN – Archive file that can are used by Optical Disks, can be extracted by 7-zip or WinRAR.
Used in BIG Software like games.
• RAR – Archive file made popular by WinRar
• ZIP – Most popular archive file type
2. Physical Recording Media Archive Files – File types used in External media devices such as optical
disks and floppy disks. Nowadays they are used as virtual installers to simulate a DVD/CD installer.
• ISO – Generic file format for most optical disks. Can be read by a Virtual Optical Disk Software.
• NRG – Proprietary file used by Nero applications.
• MDS – Disk Image file used by Daemon Tools (Virtual Optical Disk Software
3. CAD Files – Raw file types used by CAD software. They can be opened, edited, or created. Output files
are usually converted to another usually graphics files, 3d files, or video files.
• DWG – File format used by AutoCAD
• TCT – TurboCAD drawing template
• SKP – Google Sketch up file
4. Database Files – File types used by data base software.
• ACCDB – Microsoft Access Database file
• NSF – Lotus Notes Database
• MDF – Microsoft SQL Server Database file
5. Desktop Publishing Files – File types by desktop publishing software which are output files are
typically graphics. They are used in big graphical output files such as Tarpaulins.
• PUB – Microsoft Publisher file type.
• INDD – Adobe InDesign file type.
• GDRAW – Google Draw File type
6. Document Files – File types that are opened, created, or edited by various Application Software such
as Content Access and Media Development.
• DOC – Microsoft Word document file.
• ePUB – File type used in e-books. Can be opened by an e-book reader.
• mobi – E-book file type used by mobipocket software.
• ODT – OpenDocument document file.
• TXT – basic document file opened by notepad or basic document software. Referred as plain
text file.
• PDF (Portable Document Format) – Opened by PDF reader software.
7. Graphics Files – File types used in graphics software (content access or media development) this are
typically “pictures”.
• BMP – Microsoft windows bitmap image. Default picture file used by MS Paint.
• JPEG (Joint Photographic Experts Group) – The most common graphic files.
• GIF (Graphics Interchange Format) – CompuServe graphic file format.
• ICO – Graphics file used by Microsoft Windows for thumbnails, and icons of GUI.
• PNG (Portable Network Graphics) – High Quality graphics file that is getting famous nowadays
because of its “transparent” background capability.
• PSD/PDD – Adobe Photoshop file.
8. Presentation Files – File types opened, edited, or created by Presentation Software such as Prezi or
PowerPoint.
• PPT – Presentation file used by Microsoft PowerPoint
• SHW – used by Corel Presentations slideshow creation.
• PEZ – Prezi Desktop Presentation
9. Script Files – File types used by programming and web development software. Also known as
computer programming language.
• JS – Java Script
• PHP – Script file used by the PHP team
• VBS (Visual Basic Script) – Script used by Microsoft Visual Studio or MySQL
• PY – Script used by Python programming language.
• BAT, CMD – Batch file scripting used in Microsoft Windows.
10. Audio Files – File types used by Application Software that opens, edit, or create audio files. (Content
Access or Media Development). Can be a music/song file, minus one, or a BGM (background music)
• WAV (Waveform Audio File Format) – uncompressed audio file compatible in all OS. Very
large files.
• M4A – Audio file used by Apple Devices. High Quality and lossless
• MP3 (MPEG-Layer 3) MPEG means Moving Picture Experts Group. Most common audio file
type.
• WMA (Windows Media Audio) – Audio file used by Windows apps such as Windows Media
player or WinAMP
• MIDI (Musical Instrument Digital Interface) – Audio file used in minus one or BGM.
Spreadsheet Files – File types by Spreadsheet software.
• XLS – Spreadsheet file used by Microsoft Excel
• GSHEET – Google Drive Spreadsheet
• ODS – OpenDocument Spreadsheet
11. Video Files – File types used by Application Software for video editing, playing, or creating. (Content
Access or Media Development)
• 3GP – Most common video file used by cellphones (low resolution)
• GIF – Animated GIF is a video file that are moving pictures usually very short in duration and in
loopback format.
• AVI (Audio Video Interleave) – Universal Video file compatible in most media devices.
• FLV (Flash Video) – Video file used in flash animation software.
• MKV (Matroska) – Video file compatible with MP4 players that can simultaneously play/load
the subtitles of videos.
• MP4 (MPEG-4 Part 14) – Video file used mostly by Sony Devices and Apple devices
• WMV (Windows Media Video) – Video file used mostly by Windows
12. Web Page Files – File types used webpages it is also known as
special formatted text document files. Most Web Page files can be read by most Application Software
used in Programming or Web Design.
• HTML (Hyper Text Markup language)
• ASPX – Microsoft Active Server Page
• JSP – Java Server Pages
Special File Type – This file type is special to all Application Software as because without it. You cannot
launch/open the application software itself
.exe file
exe means “executable”
1. Is there a universal software for all file types? Explain your answer.
2. Give Seven File types and briefly describe them.
3. What is an .exe file?
4. Give two types of Graphics Files
5. Give two types of Audio Files
6. Give two types of Video Files
7. Give two types of Documet Files
End of Module, Learning Assessment Exam
You are now at the end of the learning module. Congratulations for a job well done! Now only
one left thing to do before proceeding to the next module. It is time to check how much have
you learned in the self-learning module you read. You will now answer the Assessment Exam
(Quiz) which will cover all the previous topics in this module.
Upon starting the quiz, Write on a separate sheet of paper or compose a document and send it
to the messenger of your teacher with Filename as Name of student-Quiz3
1. Sander wants to install the game Dead or Alive 5: Last round. He noticed the biggest file is a BIN. What
kind of file is it?
A. Script File B. Video File
C. Archive File D. Desktop Publishing File
2. Joy was surfing the internet when a pop-up window appeared and claims she won $1,000,000.00 she
clicked it accidentally and her computer experiences slowing down of performance what Malware is it?
A. Adware B. Bloatware
C. Slowware D. Trojan Rabbit
3. Scarlet wants to present her CAD file of a Duplex House design to her boss but her boss doesn’t have
a CAD software. Scarlet will convert her file, what file is most recommended?
A. PPT B. VBS
C. JPEG D. DOC
4. Mikey Bustos installed a non-verified video editor software and it was working fine until one day his
OS was corrupted. What malware is it?
A. Red Horse B. Spy Horse
C. Worm D. Trojan Horse
7. Arriana Grande is preparing a new song for her album she wants her music to be of high quality and
to be used in radio stations. What music file is best recommended for her?
A. MIDI B. M4A
C. MP3 D. WAV
8. Rina is experiencing slowing of her hard disk’s read speed. A technician informed her that her hard
disk has lots of “consumed space” from unwanted files she downloaded from the internet. What
malware is it?
A. Virus B. Bloatware
C. Spyware D. Worm
15. Ashley Gosiengfiao wants to make a short video clip of her making cute faces using her selfie pics.
What video file should she use?
A. WMV B. GIF
C. AVI D. MKV
16. Misa Chiang always uses her credit card to make online purchase but one day she had some extra
purchases that she never ordered. She was advised that a malware might be the cause what malware is
it?
A. Adware B. Bondware
C. Spyware D. Virus
17. Jinri Park compiled her pictures in a document file and wants it to be opened by Adobe Acrobat
Reader. What document file should Jinri use??
A. ePUB B. PDF
C. PPTX D. DOCX
18. What is the type of malware that is the most common and the first malware created?
A. Virus B. Adware
C. Fungus D. Trojan Horse
19. Luna is an accountant. She has a file of her company’s finance report which is an XLS file. What
software should she use?
A. Microsoft Access B. Microsoft Paint
C. Microsoft Egg Cell D. Microsoft Excel
20. What kind of malware is very hard to wipe out but is less destructive compared to a virus or Trojan
horse?
A. Worm B. Amoeba
C. Snail D. Bloatware
24. Totoy Brown is a naughty teen who accesses porn sites and one day his OS got corrupted. what is
the reason?
A. He downloaded Youtube videos. B. He accesses a non-trusted/suspicious website.
C. He is sick and infected his computer. D. He is a noob in using a computer.
25. What file type is opened by Microsoft PowerPoint which is a Presentation file?
A. BMP B. PPT
C. PRZ D. PPAP
26. Teacher Marisol is planning to have her students watch Moana. She wants the movie to
automatically load subtitles. What video file will she use?
A. MKV B. WMV
C. MP4 D. AVI
27. What is the special file that is responsible in running most software?
A. BIN file B. BAE File
C. EXE file D. EX File
28. Cris is very quirky and hyper in using the internet. He clicks everything he sees. One day his PC
became very slow. What is the reason?
A. He turned off his Wi-Fi. B. He uninstalled Internet Explorer.
C. Not updating the anti-virus. D. Clicking “Pop-up windows” in the internet.
29. What software will you use to open ISO or MDS file?
A. MS Paint B. Recycle Bin
C. WinRAR D. Daemon Tools
30. Miss Alodia uses a desktop PC that has no internet access but one day when her sister inserted a
flash drive her files got corrupted. What is the reason?
A. She downloaded a suspicious file. B. She turned off the Firewall.
C. Her PC is a wooden PC. D. The flash drive has an infected file.
https://www.forcepoint.com/cyber-edu/malware#:~:text=Malware%20is%20the%20collective
%20name,unauthorized%20access%20to%20a%20network.
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Computer_virus
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/Ransomware
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://en.wikipedia.org/wiki/Spyware
https://en.wikipedia.org/wiki/Adware
https://en.wikipedia.org/wiki/List_of_file_formats
https://en.wikipedia.org/wiki/File_format
https://www.computerhope.com/issues/ch001789.htm
https://www.youtube.com/watch?v=n8mbzU0X2nQ
https://www.youtube.com/watch?v=fKxuKWsA_JI&t=60s
https://www.youtube.com/watch?v=shDgBHUXnr8&t=129s
https://www.youtube.com/watch?v=hvgxn8v--8Q
https://www.youtube.com/watch?v=ww12lImOJ38
https://www.youtube.com/watch?v=m58rkfVRDlc