0% found this document useful (0 votes)
122 views

Computer System Servicing 1 NC-II MODULE 7C (Second Semester: Week 5)

This document provides an overview of malware and file types for a computer system servicing course. It defines malware as malicious software that can harm a computer. The document outlines common types of malware like viruses, worms, Trojan horses, spyware, adware, bloatware, and ransomware. It also describes how malware can be spread and its effects, such as slowing performance and corrupting files. The document then covers common file types used for different purposes, including documents, graphics, audio/video, spreadsheets, presentations, and archives. It provides examples of specific file extensions for each type.

Uploaded by

Carl John Gomez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

Computer System Servicing 1 NC-II MODULE 7C (Second Semester: Week 5)

This document provides an overview of malware and file types for a computer system servicing course. It defines malware as malicious software that can harm a computer. The document outlines common types of malware like viruses, worms, Trojan horses, spyware, adware, bloatware, and ransomware. It also describes how malware can be spread and its effects, such as slowing performance and corrupting files. The document then covers common file types used for different purposes, including documents, graphics, audio/video, spreadsheets, presentations, and archives. It provides examples of specific file extensions for each type.

Uploaded by

Carl John Gomez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Computer System Servicing 1 NC-II

MODULE 7C (Second Semester: Week 5)

Common Competency: Perform Computer Operations


Lesson Content 1: Malware and File Types
Learning Competency: Select appropriate hardware and software according to
task assigned and required outcome

Welcome to your learning module for Computer System Servicing 1 NC-II.


In this module you will learn about the Types of Malware that can cause harm to your computer and File
Types that we encounter in our daily interaction with technology.

Malware and File Types


Objectives: At the end of this module, you should be able to
1. Identify the different types of Malware and File Types
2. Appreciate the importance of the Malware and File Types and its relevance in real life.
3. Perform tasks related to the Malware and File

In the Last Module we have discussed the different Application Software including the types of it and
their functions. We also discussed the difference of Licensed and Freeware.

MALWARE
Malicious Software or Malware are software that were created to inject destructive/intrusive code to a
software that causes harm to a computer.

Effects of Malware:
1. Slows down performance
2. Crashes Registry files
3. Crashes or corrupts Software
4. Corrupts files
5. Can Crash/Corrupt an OS
6. Can be used to hack your sensitive info
7. Prevents you from accessing your files.
TYPES OF MALWARE
1. Virus
2. Worm
3. Trojan Horse
4. Spyware
5. Adware
6. Bloatware
7. Ransomware

Virus
Malware that is coded to harm a computer. The first malware created. Needs a user intervention to
spread/activate.

Worm
Malware that is less destructive but spreads fast w/o user intervention and is very persistent and hard to
wipe out.
Worm has a habit of returning even if it is deleted. Intense malware removal is needed.

Trojan Horse
A destructive malware. It attacks unknowingly via backdoor method. Attached to a “good” software.
Taken from the symbolic figure from History the Trojan Horse.

Spyware
Malware that once it infiltrated your computer it will store all sensitive information like passwords, bank
credentials, etc. to the hacker.

Adware
Not really harmful but some “Ads” are maliciously coded to contain other malwares that will be
downloaded to the computer once it is clicked. Can be found in the internet only.

Bloatware
Malware that is useful sometimes but consumes “large” amounts of space in a hard disk. Sometimes it’s
a software that you don’t really need and takes up unnecessary space.

Ransomware
The latest malware and one of the most dangerous right now. It can encrypt your files with a password
or a program that prevents you from accessing it. You will be directed to a website to pay in order for
you to gain access to the files. Your files were taken as hostages for ransom hence its name.
Ransomware can be false positive alert wherein you were to be notified that your computer is infected
or your files are encrypted.

How Malware are spread

1. Downloading suspicious/non-verified files.


2. Browsing suspicious/non-trusted websites.
3. Infected files transferred to other computers.
4. Clicking “pop-up” windows.
5. Installing non-trusted software.
6. Not installing or using an anti-virus software
7. Not updating your anti-virus software
Activity 7.8: My Understanding of the Lesson
Answer the following questions base on your understanding of the topic you read earlier about
the Storage Devices. Write on a separate sheet of paper make sure to write your name and
section or compose a document and send it to the messenger of your teacher with Filename as
Name of student-Module7-Activity 8

1. What is a Malware?
2. Give Three Types of Malware and briefly describe them.
3. What makes the Worm Malware difficult to deal with?
4. Why is Ransomware considered a destructive malware?
5. Give Three ways how malware can spread
6. Give Three Possible effects of Malware in a computer

File Types

• Software are created to open, edit, and create files.


• Files are information used in a computer.
• There are many different types of Files being used by computers
• NO single software can open, edit, and create all TYPES of files.
• Some files can be opened, edited, and created by a very SPECIFIC software only.
• Some files are exclusively created, edited, and opened by Propriety Software.
• You can convert files to another as long they are a same type. Using a File Converter Software.

The Different File Types


NOTE: There are hundred file types but only the most common are included in the module.

• Archive Files • Graphics Files Presentation Files


• Physical Recording Media Archived Files • Script Files
• CAD Files • Audio Files
• Database Files • Spreadsheet Files
• Desktop Publishing Files • Video Files
• Document Files • Web Page Files

1. Archive Files – this are the files that are opened, edited, and created by Archivers Software.
• 7z – Archive file used by the software 7zip
• BIN – Archive file that can are used by Optical Disks, can be extracted by 7-zip or WinRAR.
Used in BIG Software like games.
• RAR – Archive file made popular by WinRar
• ZIP – Most popular archive file type

2. Physical Recording Media Archive Files – File types used in External media devices such as optical
disks and floppy disks. Nowadays they are used as virtual installers to simulate a DVD/CD installer.
• ISO – Generic file format for most optical disks. Can be read by a Virtual Optical Disk Software.
• NRG – Proprietary file used by Nero applications.
• MDS – Disk Image file used by Daemon Tools (Virtual Optical Disk Software

3. CAD Files – Raw file types used by CAD software. They can be opened, edited, or created. Output files
are usually converted to another usually graphics files, 3d files, or video files.
• DWG – File format used by AutoCAD
• TCT – TurboCAD drawing template
• SKP – Google Sketch up file
4. Database Files – File types used by data base software.
• ACCDB – Microsoft Access Database file
• NSF – Lotus Notes Database
• MDF – Microsoft SQL Server Database file

5. Desktop Publishing Files – File types by desktop publishing software which are output files are
typically graphics. They are used in big graphical output files such as Tarpaulins.
• PUB – Microsoft Publisher file type.
• INDD – Adobe InDesign file type.
• GDRAW – Google Draw File type

6. Document Files – File types that are opened, created, or edited by various Application Software such
as Content Access and Media Development.
• DOC – Microsoft Word document file.
• ePUB – File type used in e-books. Can be opened by an e-book reader.
• mobi – E-book file type used by mobipocket software.
• ODT – OpenDocument document file.
• TXT – basic document file opened by notepad or basic document software. Referred as plain
text file.
• PDF (Portable Document Format) – Opened by PDF reader software.

7. Graphics Files – File types used in graphics software (content access or media development) this are
typically “pictures”.
• BMP – Microsoft windows bitmap image. Default picture file used by MS Paint.
• JPEG (Joint Photographic Experts Group) – The most common graphic files.
• GIF (Graphics Interchange Format) – CompuServe graphic file format.
• ICO – Graphics file used by Microsoft Windows for thumbnails, and icons of GUI.
• PNG (Portable Network Graphics) – High Quality graphics file that is getting famous nowadays
because of its “transparent” background capability.
• PSD/PDD – Adobe Photoshop file.

8. Presentation Files – File types opened, edited, or created by Presentation Software such as Prezi or
PowerPoint.
• PPT – Presentation file used by Microsoft PowerPoint
• SHW – used by Corel Presentations slideshow creation.
• PEZ – Prezi Desktop Presentation

9. Script Files – File types used by programming and web development software. Also known as
computer programming language.
• JS – Java Script
• PHP – Script file used by the PHP team
• VBS (Visual Basic Script) – Script used by Microsoft Visual Studio or MySQL
• PY – Script used by Python programming language.
• BAT, CMD – Batch file scripting used in Microsoft Windows.

10. Audio Files – File types used by Application Software that opens, edit, or create audio files. (Content
Access or Media Development). Can be a music/song file, minus one, or a BGM (background music)
• WAV (Waveform Audio File Format) – uncompressed audio file compatible in all OS. Very
large files.
• M4A – Audio file used by Apple Devices. High Quality and lossless
• MP3 (MPEG-Layer 3) MPEG means Moving Picture Experts Group. Most common audio file
type.
• WMA (Windows Media Audio) – Audio file used by Windows apps such as Windows Media
player or WinAMP
• MIDI (Musical Instrument Digital Interface) – Audio file used in minus one or BGM.
Spreadsheet Files – File types by Spreadsheet software.
• XLS – Spreadsheet file used by Microsoft Excel
• GSHEET – Google Drive Spreadsheet
• ODS – OpenDocument Spreadsheet

11. Video Files – File types used by Application Software for video editing, playing, or creating. (Content
Access or Media Development)
• 3GP – Most common video file used by cellphones (low resolution)
• GIF – Animated GIF is a video file that are moving pictures usually very short in duration and in
loopback format.
• AVI (Audio Video Interleave) – Universal Video file compatible in most media devices.
• FLV (Flash Video) – Video file used in flash animation software.
• MKV (Matroska) – Video file compatible with MP4 players that can simultaneously play/load
the subtitles of videos.
• MP4 (MPEG-4 Part 14) – Video file used mostly by Sony Devices and Apple devices
• WMV (Windows Media Video) – Video file used mostly by Windows

12. Web Page Files – File types used webpages it is also known as
special formatted text document files. Most Web Page files can be read by most Application Software
used in Programming or Web Design.
• HTML (Hyper Text Markup language)
• ASPX – Microsoft Active Server Page
• JSP – Java Server Pages

Special File Type – This file type is special to all Application Software as because without it. You cannot
launch/open the application software itself

.exe file
exe means “executable”

Activity 7.9: My Understanding of the Lesson


Answer the following questions base on your understanding of the topic you read earlier about
the Storage Devices. Write on a separate sheet of paper make sure to write your name and
section or compose a document and send it to the messenger of your teacher with Filename as
Name of student-Module7-Activity 8

1. Is there a universal software for all file types? Explain your answer.
2. Give Seven File types and briefly describe them.
3. What is an .exe file?
4. Give two types of Graphics Files
5. Give two types of Audio Files
6. Give two types of Video Files
7. Give two types of Documet Files
End of Module, Learning Assessment Exam
You are now at the end of the learning module. Congratulations for a job well done! Now only
one left thing to do before proceeding to the next module. It is time to check how much have
you learned in the self-learning module you read. You will now answer the Assessment Exam
(Quiz) which will cover all the previous topics in this module.
Upon starting the quiz, Write on a separate sheet of paper or compose a document and send it
to the messenger of your teacher with Filename as Name of student-Quiz3

Part 1: Multiple Choice


DIRECTIONS: Identify the pictures and write the letter of your answer on your separate sheet of
paper.

1. Sander wants to install the game Dead or Alive 5: Last round. He noticed the biggest file is a BIN. What
kind of file is it?
A. Script File B. Video File
C. Archive File D. Desktop Publishing File

2. Joy was surfing the internet when a pop-up window appeared and claims she won $1,000,000.00 she
clicked it accidentally and her computer experiences slowing down of performance what Malware is it?
A. Adware B. Bloatware
C. Slowware D. Trojan Rabbit

3. Scarlet wants to present her CAD file of a Duplex House design to her boss but her boss doesn’t have
a CAD software. Scarlet will convert her file, what file is most recommended?
A. PPT B. VBS
C. JPEG D. DOC

4. Mikey Bustos installed a non-verified video editor software and it was working fine until one day his
OS was corrupted. What malware is it?
A. Red Horse B. Spy Horse
C. Worm D. Trojan Horse

5. Which of the following is NOT a VIDEO file?


A. AVI B. JSP
C. 3GP D. MP4

6. Which of the following is NOT an effect or symptoms of a Malware?


A. Steals/Hacks Sensitive Info B. Crashes/Corrupts OS
C. Slows down Performance D. Burning your CPU

7. Arriana Grande is preparing a new song for her album she wants her music to be of high quality and
to be used in radio stations. What music file is best recommended for her?
A. MIDI B. M4A
C. MP3 D. WAV

8. Rina is experiencing slowing of her hard disk’s read speed. A technician informed her that her hard
disk has lots of “consumed space” from unwanted files she downloaded from the internet. What
malware is it?
A. Virus B. Bloatware
C. Spyware D. Worm

9. What is the meaning of PDF?


A. Portable Document Format B. Portable Document File
C. Portable Doctrine Format D. Proxy Document File
10. What is the meaning of PNG?
A. Portable New Graphics B. Portable Nerve Gear
C. Proxy Network Graphics D. Portable Network Graphics

11. Which of the following is NOT a MALWARE?


A. Trojan Horse B. Worm
C. Black Hawk Down D. Spyware

12. What is the meaning of GIF?


A. Graphical International Format B. Graphics Internet Format
C. Graphics Interchange Format D. Graphics Interface Format

13. Which of the following is a file that is opened by Microsoft Word?


A. PDF B. AVI
C. MP4 D. DOC

14. What software are harmful to a computer or to the user?


A. Evilware B. Trojan Horse
C. Malware D. Backdoorware

15. Ashley Gosiengfiao wants to make a short video clip of her making cute faces using her selfie pics.
What video file should she use?
A. WMV B. GIF
C. AVI D. MKV

16. Misa Chiang always uses her credit card to make online purchase but one day she had some extra
purchases that she never ordered. She was advised that a malware might be the cause what malware is
it?
A. Adware B. Bondware
C. Spyware D. Virus

17. Jinri Park compiled her pictures in a document file and wants it to be opened by Adobe Acrobat
Reader. What document file should Jinri use??
A. ePUB B. PDF
C. PPTX D. DOCX

18. What is the type of malware that is the most common and the first malware created?
A. Virus B. Adware
C. Fungus D. Trojan Horse

19. Luna is an accountant. She has a file of her company’s finance report which is an XLS file. What
software should she use?
A. Microsoft Access B. Microsoft Paint
C. Microsoft Egg Cell D. Microsoft Excel

20. What kind of malware is very hard to wipe out but is less destructive compared to a virus or Trojan
horse?
A. Worm B. Amoeba
C. Snail D. Bloatware

21. Which of the following is NOT a Graphics File?


A. GIF B. JPEG
C. BMP D. PDF
22. Which of the following is NOT a reason why malware are spread?
A. Accessing suspicious/non-trusted websites
B. Sharing infected files via USB, Bluetooth, Share-it, etc.
C. Installing a Device Driver
D. Not updating your anti-virus software

23. What software can open all kinds of file types?


A. Universal File Reader B. Programming Software
C. Galaxy Reader D. NONE of the choices

24. Totoy Brown is a naughty teen who accesses porn sites and one day his OS got corrupted. what is
the reason?
A. He downloaded Youtube videos. B. He accesses a non-trusted/suspicious website.
C. He is sick and infected his computer. D. He is a noob in using a computer.

25. What file type is opened by Microsoft PowerPoint which is a Presentation file?
A. BMP B. PPT
C. PRZ D. PPAP

26. Teacher Marisol is planning to have her students watch Moana. She wants the movie to
automatically load subtitles. What video file will she use?
A. MKV B. WMV
C. MP4 D. AVI

27. What is the special file that is responsible in running most software?
A. BIN file B. BAE File
C. EXE file D. EX File

28. Cris is very quirky and hyper in using the internet. He clicks everything he sees. One day his PC
became very slow. What is the reason?
A. He turned off his Wi-Fi. B. He uninstalled Internet Explorer.
C. Not updating the anti-virus. D. Clicking “Pop-up windows” in the internet.

29. What software will you use to open ISO or MDS file?
A. MS Paint B. Recycle Bin
C. WinRAR D. Daemon Tools

30. Miss Alodia uses a desktop PC that has no internet access but one day when her sister inserted a
flash drive her files got corrupted. What is the reason?
A. She downloaded a suspicious file. B. She turned off the Firewall.
C. Her PC is a wooden PC. D. The flash drive has an infected file.

END OF MODULE. CONGRATULATIONS!!


Online and Video References

https://www.forcepoint.com/cyber-edu/malware#:~:text=Malware%20is%20the%20collective
%20name,unauthorized%20access%20to%20a%20network.
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Computer_virus
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/Ransomware
https://en.wikipedia.org/wiki/Trojan_horse_(computing)
https://en.wikipedia.org/wiki/Spyware
https://en.wikipedia.org/wiki/Adware
https://en.wikipedia.org/wiki/List_of_file_formats
https://en.wikipedia.org/wiki/File_format
https://www.computerhope.com/issues/ch001789.htm
https://www.youtube.com/watch?v=n8mbzU0X2nQ
https://www.youtube.com/watch?v=fKxuKWsA_JI&t=60s
https://www.youtube.com/watch?v=shDgBHUXnr8&t=129s
https://www.youtube.com/watch?v=hvgxn8v--8Q
https://www.youtube.com/watch?v=ww12lImOJ38
https://www.youtube.com/watch?v=m58rkfVRDlc

You might also like