Sie sind auf Seite 1von 5

Research Paper in TLE – 9

I. Background of the Study

Have you ever experienced a virus in your computer? If you have, then this is the

research study you need to learn. As our generation advances together with our technology, the

human power created different kinds of computers, to satisfy the technological need of a person.

Our technology leveled up to much innovation to the point where Hackers and Trojans creates

malicious software’s to infiltrate and damage our technology without consent. This study

examines the different types of malwares and how do they operate to destroy our computers as a

reference for Academic Purposes.

Virus creators or “virus writers” started in early 80’s until the late 90’s hackers and virus

writers used their profession for criminal use. The internet had become everyone’s nurse for

information. Businesses and banks were already using it for transactions. As practical as online

shopping and banking are, they also started a world of opportunities for economic exploitation of

both corporations and ordinary computer user.

The term malware includes viruses, worms, Trojan, Horses, rootkits, spyware, key

loggers and more. To get an overview of the difference between all these types of threats and the

way they work, it makes sense to divide them into groups.

Viruses and Worms – they are defined by their action – malicious software designed to

spread without the user’s knowledge. A virus infects software and when the software is used by

the owner of the computer it spreads the virus – so viruses need you to act before they spread.

Computer worms on the other hand, spread without the user’s action.
Trojans and Rootkits- they are grouped together as they both seek to conceal attacks on

computers. Trojan Horses are malicious pieces of software pretending to be benign applications.

Computer users therefore download them thinking that they will get a lot of help from this

software and instead of getting help, they end up getting malware infections. Rootkits are

different. They are a masking technique for malware, but do not contain damaging software.

Rootkit were invented by virus writers to conceal malware, so it would go unnoticed by antivirus

products.

Spyware and Keyloggers – are malware used in malicious attacks like identity theft,

phishing and social engineering – threats designed to rob money from unknown users, businesses

and banks. The latest security reports for the first quarter of 2011 put Trojan infections at the

summit of malware list, with more than 70% all of malicious files detected on computer units

followed by traditional viruses and worms. (The definition of Malware/ What is malware in

computer? / Computer Malware)

II. Statement of the Problem

This study aims to determine about the computer problem Malware towards the usage of

Computer Academic Purpose in some School and Shops particularly in General Pio Del Pilar.

It mainly pursues to answer the following:

1. What is the profile of the respondents in terms of:

A. Name (optional)

B. Age

2. What action did they make to resolve the problem?


3. How many computer owners have experienced malware to their computer shops?

III. Significance of the Study

This study will be a great benefit to the following:

Computer Shops

It will be a large factor for computer shop owners in terms of awareness in the effect of

malware in their computers. This study may help them know about the information gathered

about malwares when it comes to their shops.

Teachers

This study will inform the teacher about the malware of computers thus, make the

teachers aware if his/her laptop is broken because of the malware so that he/she can easily go to

the repair shop and let them fix the malware in his/her laptop.

Department of Education (DepEd)

Due to this study, the DepEd will be informed to enhance and widened the standard of

the quality of the laptop they use for educational purposes. The officials from DepEd will be

more fully aware of Malware and Computer Viruses in terms of studying.

IV. Assumption of the Study

In our generation today where technologies arise, different computers come up.

Computer is an instrument where you can do so many things such as playing, researching,

working and use it for academic purposes, etc. Computer is so helpful in our society today, but
we cannot manage it properly if it has problems. This study will give us awareness about

different computer problems and how can we resolve them.

In conducting this study the following assumptions are made:

1. All of the respondents must have experienced using computers.

2. The respondents based the answer on personal experience.

Furthermore the researchers assume that this study will be successful and will give knowledge to

others and know the possible effects and disadvantages of computer crimes especially to those

who are using computer to prevent other types of problem in software or hardware.

This will give awareness to those who are planning to build computer shops as their business.

V. Scopes and Limitations

The study will focus on Malware, basically how they function, and the different types of it. We

conducted data in different computer shops and asked them “What are the problems you

encounter in this shop or in the computers?” And by that we will know that one of their problems

is Computer Malware which we already explained. And by researching this also and studying

computer malware we can easily know what will happen or what can happen to our computer

because of computer malware. We can install different types of scanners and anti-viruses to

prevent this situation.


VI. Definition of Terms

COMPUTER

- An Electronic Device for storing and processing data, typically in binary form, according to

instructions given to it in a variable program (Oxford English Dictionary).

MALWARE

- Malware, or malicious software, is any program or file that is harmful to a computer user.

Malware includes computer viruses, worms, Trojan horses and spyware (Rouse 2008)

SOFTWARE

- Programs for a computer (Merriam Webster)

HARDWARE

- Computer hardware is a collective term used to describe any of the physical components of an

analog or digital computer. The term hardware distinguishes the tangible aspects of a computing

device from software, which consists of written instructions that tell physical components what

to do (Rouse 2006)

GADGETS

- A small device or machine with a particular purpose:

Digital/electronic (Cambridge Dictionary)

Passed by: Ronaldo C. Celoso Jr. and Gabriel A. Garcia ( 9 – Gold )

Passed to: Mrs. Miles Aguilar and Mr. Angelo Bulos

Das könnte Ihnen auch gefallen