Research Study of Computer Viruses in Practical Research Research Study of Computer Viruses in Practical Research
Research Study of Computer Viruses in Practical Research Research Study of Computer Viruses in Practical Research
Research Study of Computer Viruses in Practical Research Research Study of Computer Viruses in Practical Research
Chapter I
Introduction
From the past generations, people use books searching and gathering information for their academic
activities and also the way they communicate with one another is through letter. When new generations come,
technology arises that they are made to create computer which is more capable to perform an easy way of gathering
information where in just one click we can have the information we are looking for. The communication between
two people became much easier through social media. As time passes, technology innovates and create more
useful device like android phone which is more efficient and comfortable to handle and use anywhere. Computer
The computer virus also born and it became a dangerous program in the world of technology where it has
the ability to destroy the program of a computer. It can replicate itself to spreads from other computer through
sharing infected files. Once the virus is installed on a computer, the virus modified or remove the application and
system files. Some computer viruses make the computer inoperable, others merely display starting screen message
to unsuspecting users. Virus is used by hackers to steal information, stalk someone, and control other devices.
Computer virus is a malicious code or a program written to alter the way computer operates. It is like to
human virus where the virus is destroying the immune system of human while on the virus of the computer is
damaging the software and corrupting data. This computer virus is also a serious matter in our daily life, cause it
can harm us from many reason like for example, corrupting or deleting your important files also it slow the
performances of your computer where it consume a lot of time for our activities. Computer virus can also get and
spread your personal information that can destroy your memory. It has the ability to replicate itself so that it can
Though some viruses do little but replicate, others can cause serious damage or affect programs and system
performance for the students. Computer viruses can steal your personal data or information without knowing it.
For instances, it will make yourself ill and overthink on how you get back and re-own your personal data.
Computer is increasingly used by our fellow students from different schools. The researchers observed
that some evidence of computer viruses could be harmful for the academic performance of students. Thus the
main potential concern of the conduct of this study is how to prevent computer viruses towards the academic
The purpose of this research is to discuss different types of computer viruses along with their
characteristics working effect on the computer systems. Suggest, measure for detecting the virus infection in the
Age:
Gender:
Section:
5.) What is the best way to prevent and stop the virus?
Conceptual Framework
Table 1
Figure 1: This conceptual framework illustrates a diagram that shows the Input, Process, and Output of the
Research Study.
Theoretical Framework
Presented by Xiaofan Yang, Bimal Kumar Mishra, Yanbing Liu Computer viruses are a large class of
malicious codes that can spread among computers and perform detrimental operations. This issue on theory,
model, and methods of computer virus aims to better understand the way computer viruses spread on the Internet
and thereby work out effective policies of defending against them. This issue contains 12 fascinating papers, with
The majority of previous computer virus epidemic models neglect the notable difference between
computer viruses and infectious diseases. Noting that all infected computers have infectivity naturally, X. Yang
and L.-X. Yang suggest a series of novel epidemic models, known as the SLBS models. Toward this direction,
L.-X. Yang and X. Yang address a special SLBS model, declaring its global dynamics. By incorporating a
temporary immunity compartment in an SLBS model, M. Yang et al. derive a new model, known as the SLBRS
In reality, virus spreading is influenced by multifarious factors. C. Gan et al. examine the effect of human
intervention on virus spreading, proclaiming the global properties of the proposed model. J. Ren et al. investigate
the influence of time-varying delay on virus spreading, obtaining similar theoretical results. In view of impulsive
vaccinations, C. Zhang et al. devise an impulsive epidemic model, arguing the existence of a globally attractive
periodic solution provided the vaccination rate is large enough. Noting the inevitable fluctuation of a system
parameter, C. Zhang et al. induce a stochastic epidemic model, announcing its global stability.
As autonomous computer viruses, worms and botnets turn out to be a great threat to information security.
By incorporating three additional compartments in the conventional SEIS model, Yao et al. propose a delayed
epidemic model of worms, showing that a Hopf bifurcation phenomenon might occur. L. Feng et al. raise a model
of peer-to-peer botnet and investigate its global dynamics from both the microlevel and the macrolevel.
Smart mobile terminals have come to be an integral part of the Internet. By a close inspection of the
features of both smart mobile terminals and human behaviors, Y. Liu et al. propose a practical virus detection
scheme.
The Internet turns out to possess scale-free property, with node degrees following a power-law
distribution. In this context, C.-Y. Huang and C.-T. Sun probe deeply the effect of available resources and costs
Hypothesis
Grade 12 ICT Student’s academic activities has implication on computer virus that slows the computer’s
Virus is a very dangerous program in the computer because it can affect the academic performances of a
student, in order to prevent it, the researchers will gather data from Arellano University, Pag-Asa St., Caniogan
Pasig City. The respondents will be the Grade 12 ICT students that will serve as the sources of the information on
how to prevent virus and what are the things that may happen to the students if they encounter a computer virus
also how virus is related to the computer. This study will only cover about virus and it’s work on the Computer
They can work easily and faster without interruptions. They will be provided with solid knowledge about
the computer hardware when they want to solve a serious problem on their own.
ICT Students
They will be able to do work quickly and efficiently. They will save more time for other academic activities
Teachers –
They will be informed on how to deal with each kind of viruses and how they can avoid and be able to
stop it. Their important files such as students’ records will be safe from virus.
Definition of Terms
The information below helps the readers to fully understand the researcher papers from the researchers.
Academic Performance- Is the extent to which a student, teacher, or institution achieved their short or long term
educational goals.
Computer Hardware - Computer hardware includes the physical parts or components of a computer.
Computer Program- Is a collection of instructions for performing a specific task that is designed to solve a
Computer System - Is a basic, complete, and functional computer, including all the hardware and software
Computer Users - A person who utilizes a computer or network service. It is often has a user account and is
Computer Virus- Much like a flu virus, is designed to spread from host to host and has the ability to replicate
itself.
Data Corruption - Errors in computer data that occur during writing, reading, storage, transmission or processing
CHAPTER II
From the Researcher’s Gathered Information, Related Literature both Foreign and Local, The Researchers
found out the importance of computer which is demanded in the whole world also its benefits to the Computer
Users. This Related Literature also states the dangerous of Computer Viruses that made the public aware and deal
with it, where it also states the destruction of Computer Viruses in the whole World and the discovery of new
viruses that is highly dangerous than the previous virus. It also states the history of Computer Virus on how they
created by manpower.
Foreign Literature
According to Reuter, (June 27, 2017) observed that a new cyber virus spread from Ukraine to wreak havoc
around the globe on Wednesday, crippling thousands of computers, disrupting ports from Mumbai to Los Angeles
and halting production at a chocolate factory in Australia. The virus is believed to have first taken hold on Tuesday
in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited
a local news site, national police and international cyber experts said. More than a day after it first struck,
companies around the world were still wrestling with the fallout while cyber security experts scramble to find a
way to stem the spread. U.S. delivery firm FedEx Corp (FDX.N) said its TNT express division had been
significantly affected by the virus, which also wormed its way into South America, affecting ports in Argentina
operated by China’s Cofco. Demanded victims post a random worth $300 in bitcoins or lose their data entirely,
similar to the extortion tactic used in the Global WannaCryransomware attacked in May. More than 30 victims
paid up but security experts are questioning whether extortion was the goal, given the relatively small sum
demanded, or whether the hackers were driven by destructive motives rather than financial gain. Hackers asked
victims to notify them by email when ransoms had been paid but German email provider posteo quickly shutdown
the address, a German government cyber security official said. Ukraine, the epicenter of the cyber strike, has
repeatedly accused Russia or orchestrating attacks on its computer system and critical power infrastructure since
its powerful neighbor or annexed the Black Sea peninsula of Grimea in 2014.
7
As stated by Dutta, P., (March 31, 2015) by his work “Benefits of Computer in Society” observed that
ever since the first IBM PC was sold in 1981 in the bundling of microsoft’s windows operating system on
subsequent easy-to-use PC’s, computers have revolutionized the way individuals, students, and enterprises work,
communicate, live, educate, and entertain. Computers are now integral to virtually every possible human and non-
Works – Computers are now use in every domain field and sector and across industries. They are used for a
variety of task, application, and activities and to enhance productivity on all fronts.
Communication- the advent of the Internet and its proliferation have force-multiplied the usage of computers.
People all over the world are able to communicate, engage and interact with each other using IM, email, Blogs,
Job Influence- the widespread use and application of computers has created multiple industries derived sectors
Entertainment- High-end desktops and full-featured notebook PC’s have become all-in-one entertainment
systems for millions of users as they watch movies, sports, events and news program, shop, socialize, download
Education- computer have simplified and streamlined the process of education for millions of young teens,
college going students and post-graduates. The use of computers has democratized the influence, reach and
penetration of education and knowledge to students in far-flung and geographically remote regions.
In agreement with Judge (2018) Robert Thomas, an engineer at BBN Technologies developed the
first known Computer Virus in the year 1971. The first virus was christened as the “Creeper” virus, and the
experimental program carried out by Thomas infected mainframes on ARPANET. The teletype message displayed
on the screen read, “I’m the creeper: Catch me if you can.” But the original wild computer virus probably the first
one to be tracked down in the history of computer viruses was “Elk Cloner.” The Elk Cloner infected apple II
operating systems through floppy disks. The message displayed on Infected Apple Computer was a humorous
one. The virus was developed by Richard Skrenta, a teenager in the year 1982. Even though the computer viruses
were designed as a prank, it also enlightened how a malicious program could be installed in a computer’s memory
and stopped users from removing the program. It was Fred, who coined the terms “computer virus” and it was
after a year in 1983. The terms came into being when he attempted to write an academic paper titled “Computer
Viruses- Theory and Experiments” detailing about the malicious programs in his work.
Conforming to Overton, M. (2008) by his work “Malware Forensics detecting the unknown” observed
to looked at what tricks, tools and techniques one can use to help establish the true state of the suspect system.
Focused on step by step approach of what tools to use, what to look for & what to do with any suspicious files.
Based on WeebrootThink of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps
you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very
similar. Designed to replicate relentlessly, computer viruses infect your programs and files, alter the way your
In 2013, the botnet virus GameoverZueS was discovered to use peer-to-peer downloading sites to
distribute ransomware and commit banking fraud. While tens of thousands of computer viruses still roam the
internet, they have diversified their methods and are now joined by a number of malware variants like
Even if you’re careful, you can pick up computer viruses through normal Web activities like:
4. Downloading free games, toolbars, media players and other system utilities
9
Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or
reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it
impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your
system’s performance, sapping computer memory and causing frequent computer crashes.
Your computer may be infected if you recognize any of these malware symptoms:
When your arm yourself with information and resources, you’re wiser about computer security threats and less
vulnerable to threat tactics. Take these steps to safeguard your PC with the best computer virus protection:
10
8. Carefully evaluate free software and file-sharing applications before downloading them.
An unprotected computer is like an open door for computer viruses. Firewalls monitor Internet traffic in
and out of your computer and hide your PC from online scammers looking for easy targets. Products like Webroot
Internet Security Complete and Webroot Antivirus provide complete protection from the two most dangerous
threats on the Internet – spyware and computer viruses. They thwart threats before they can enter your computer,
stand guard at every possible entrance of your computer and fend off any computer virus that tries to open, even
While free antivirus downloads are available, they just can't offer the computer virus help you need to
keep up with the continuous onslaught of new strains. Previously undetected forms of polymorphic malware can
often do the most damage, so it’s critical to have up-to-the-minute, guaranteed antivirus protection.
Local Literature
According to Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer
Systems?” Examined that in every computer user, they use like software, installers, game application, and
accessories in computer systems. But some users irritate why their computers slows down, boot problems and
other unknown computer problems in Computer. It’s a “Computer Virus” also known as Malwares. A computer
virus is a type of malware that when executed replicates by inserting copies of itself into other computer programs,
data files, or the boot sector of the hard drive when this replication succeeds, the affected areas are then said to be
“Infected”. Viruses often perform some type of harmful activity on infected host, such as stealing hard disk space
or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the
user’s screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive
11
payload or attempt to hide themselves-the defining characteristic of viruses is that they are self-replicating
computer program which install themselves without the user’s consent. Through the course of using the Internet
and your computer, you may have come into contact with computer viruses. Many computer viruses are stopped
before they can start, but there is still an ever growing concern as to what to do computer viruses do and the list
of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your
email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses
are often spread by attachments in email messages or instant messaging messages. That is why it is essential that
you never open email attachment unless you know who it’s from and you are expecting it. Viruses can be disguised
as attachments of funny images, greeting cards, or audio and video files. It also spread through downloads on the
Internet in which they can hide in elicit software or other files or programs you might download. To help avoid
computer viruses, it’s essential that you keep your computer current with the latest updates and antivirus tools,
stay informed about recent threats, run your computer as a standard user, and that you follow a few basic rule
when you surf in the Internet, download files, and open attachments. Malware is a term that is used for malicious
software that is designed to do damage or unwanted actions to a computer system. Examples of Malware include
the following:
1. Viruses
2. Worms
3. Trojan horses
4. Spyware
1. You notice that the computer is unusually slow, crashes, or stops responding frequently.
2. You cannot start your virus scanner or some system tools, including Task Manager.
12
3. You cannot open certain webpages. In a particular you cannot open security–related webpages such as the
These symptoms may indicate that your computer is infected with malware. However, the same problem
might also point to hardware or software issues that have nothing to do with Malware. Because it is difficult to
determine the reasons for your computer’s strange behavior, we suggested that you review the information in this
article to determine whether malware is causing the issue. Then, you can use the recommended tools and resources
As per Renson, R., D.,(2011) in his work “How Computer Viruses destructs the Computer Systems?”
Examined that the idea of having a computer in the home would have been met with sympathetic laughter. Within
the past ten years, computer science has advanced in great leaps, and made this dream a reality. No longer is the
computer considered an alien and inaccessible commodity. It has become such a standard household item that one
only has to look about the home to see its profound effect. We have become more and more reliant on this
newfound technology and power. With it has come a new vulnerability. A destructive force, once only speculated
about in science fiction books, has now become a painful reality. It has been dubbed the “Computer Virus”. Over
a short period of time, the threat has become so great that entire nation is forced to contend with it. Now all
computer users must learn how to protect themselves against it. As well, whole sciences have been developed to
study this new and highly dangerous technology. COMPUTER VIRUS: The Technology and Evolution of an
Artificial LifeForm is an expose written for everyone who owns or work with computers, detailing all aspects of
the computer virus, and similar technologies. Virus scanning, removal, and safeguarding are discussed at length,
along with comparison testing between several popular Anti-Virus software packages. Two branches of science
stemming from computer virus technology, synthetic psychology and artificial life, are considered in depth.
In agreement with Renson, R., D.,(2011) in his work “How Computer Viruses destructs the Computer
Systems?” Examined that in late 1992, the number of computer viruses was estimated from 1,000 to 2,300 viruses.
13
In 2002 there were 60,000 known viruses, Trojan, worms, and variations. Today there are well over 100,000
known computer viruses Studies and researches show that a computer connected to the internet may experience
an attack every 39 second. new vulnerabilities in the system are disconnected every few days. these vulnerabilities
are fixed by the software vendor who provide patches and update for the system. However, during this process
the vulnerabilities exploit by hackers, where malicious programs are installed on user machines to steal secret
data for financial gains. The compromised machines can also be made a part of a huge botnet that can be used to
launch denial of service attack on server, or be used in an attempt to intude the computers of government agencies.
Based on Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer Systems?”
Examined that Computer virus is a fascinating to many who are interested in nature, biology, or mathematics.
Everyone who uses a computer will likely encounter some form of the increasingly common problem of computer
viruses. In fact, some well-known computer virus researchers became interested in the field when, decade ago,
their own systems were infected. The title of Donald Knuth’s book series, The Art of Computer Programming,
suggests that anything we can explain to a computer is science, but that which we cannot currently explain to a
computer is an art. Computer virus research is a rich, complex, multifaceted subject. It is about reverse
engineering, developing detection, disinfection, and defense systems with optimized algorithms, so it naturally
has scientific aspects; however, many of the analytical methods are an art of their own. This is why outsiders often
find this relatively young field so hard to understand. Even after years of research and publications, many new
analytical techniques are in the category of art and can only be learned at antivirus and security vendor companies
or through the personal associations one must forge to succeed in this field. This book attempts to provide an
insider’s view of this fascinating research. In the process, “I hope to teach many facts that should interest both
students of the art and information technology professionals”. My goal is to provide an extended understanding
of both the attackers and the systems built to defend against virulent, malicious programs. Although there are
many books about computer viruses, only a few have been written by people experienced enough in computer
virus research to discuss the subject for a technically oriented audience. The following sections discuss historical
14
points in computation that are relevant to computer viruses and arrive a t a practical definition of the term computer
virus.
In accordance Renson, R., D.(2011) in his work “How Computer Viruses destructs the Computer
Systems?” Examined that fellow students swelled with pride at the drab little computer college where the 23-year-
old student, Onel de Guzman had outline something close to the rogue program in a thesis proposal. ‘it was
wrong,” conceded one of them, ‘but amazing!” After several days in hiding, Mr.de Guzman appeared at a
news conference, seeming overwhelmed by the extent of the destruction, and admitted that “it is Possible” that he
had unleashed the program that caused tens of millions of dollars of damage in more than 20 countries. Hiding
behind dark glasses and sometimes burying his face in his hands, Mr. de Guzman said that he had been fooling
around with fellows students in an informal club called GrammerSoft and had only wanted to create “a
gimmick”—a term used among young people here for an event that is exciting and fun. Asked what he felt about
the damage, he looked down and mumbled, “Nothing.” At one point, evading a question, he bent forward in his
seat and covered his ears with his hands. His Lawyer Rolando Quimbo, who often translated his mumbled answers
into full sentences, said the young man had come forward to demonstrate that he was not hiding from the law. He
added: “he is not really aware that the act imputed to him was done by him.” This befuddlement seemed telling
as this low-tech country find itself the epicenter of an international furor over crime in cyberspace. Because
computers play such a small role in the Philippines, it has never seen the need to write laws governing the internet.
It will take some legal creativity to prove that the creator of the program –a hybrid of varieties known as viruses
and worms – even committed a crime. For most students at schools like the AMA Computer College, where Mr.
de Guzman studies, computer literacy is a ticket to journeyman’s job overseas, following in a tradition that has
sent millions of Filipinos abroad to work as laborers, nurses and domestic helpers. For most other Filipinos, the
computer is still a source of futuristic amazement. Because of its low level of computerization, the Philippines
itself was not among the nations badly affected by the virus. This is a country of nearly 80 million people where
only 200,000 computers were sold last year. It is a country with one of the world’s high literacy rates, where only
15
CHAPTER III
This chapter presents the discussion of the methods of the researchers used. Describes the respondents of
the study, the sampling techniques that will be used, the researcher’s instrument in data gathering and the
Research Methodology
It is the specific procedures or techniques used to identify, select, process, and analyze information about
a topic.
The method will be used in this research is descriptive research and survey method. Where Descriptive
Research is used to describe the characteristics of a population or phenomenon being studied. It does not answer
questions about how/when/why the characteristics occurred. Rather it addresses the “what” question.
The characteristics used to describe the situation of a population are usually some kind of categorical scheme
also known as descriptive categories while survey methodology studies to the sampling of individual units from
a population and associated techniques of survey data collection such as questionnaire construction and methods
for improving the number and accuracy of responses to surveys. Survey methodology includes instruments or
procedures that ask one or more questions that may or may not be answered.
In this research study, 158 students in 3 different sections of Grade 12, the ICT2, ICT3, and ICT4 of ICT
Strand in Arellano University – Pasig will serve as researchers’ respondents for the research questionnaire.
The population of this study is 158 Grade 12 ICT students with a Sample size of 114 that get through the
formula which has come up from the Margin of Error. 38 students per section will be guided during the survey
and also the questionnaires will provide instructions and choices for the respondents to fully understand and
16
According by Adi Bhat Simple random sampling is a sampling technique where every item in the
population has an even chance and likelihood of being selected in the sample. Here the selection of items
completely depends on chance or by probability and therefore this sampling technique is also sometimes known
as a method of chances.
This process and technique is known as simple random sampling, and should not be confused
with systematic random sampling. A simple random sample is a fair sampling technique.
Simple random sampling is a very basic type of sampling method and can easily be a component of a more
complex sampling method. The main attribute of this sampling method is that every sample has the same
The sample size in this sampling method should ideally be more than a few hundred so that simple random
sampling can be applied in an appropriate manner. It is sometimes argued that this method is theoretically simple
to understand but difficult to practically implement. Working with large sample size isn’t an easy task and it can
The Researchers’ use Simple random sampling for the study about “A Study on the Implications of
Computer viruses to the Computer activities of Grade 12 ICT Students in Arellano University – Pasig School
Year 2018-2019 where this study focuses about computer virus so that we choose ICT Students which is more
efficient and knowledgeable to answer each and every questions that the Researchers made.
Research Instrument
The instrument used in this research is a guided response type survey questionnaire where it is base from
researchers’ statement of the problem that will be used for the respondent to get their answer in researchers’
research problem.
17
Validation of Instrument
The survey questionnaire was validated by an English of Arellano University-Pasig Mr. Gerard S. Lavin.
To make sure that our questionnaire is formal and neat for gathering information for our research study.
The researchers’ sources of data will be from Grade 12 ICT Students who is well-knowledgeable about
computers and that can easily understand and answer the survey questionnaire. So that the respondents provide
the researchers an information about the connection of Computer virus to the Computer activities. The
Researchers will get 38 respondents from 3 sections which is Grade 12 ICT2, ICT3, and ICT4 to answer the
survey questionnaires. After this, the Researchers will analyze all the answers that the researchers gathered from
The Statistical statement that the researcher will be using is the Data analysis where it used to find the
Standard deviation and the Mean of each answer in the questionnaire.
Sloven Formula
n= 114
18
CHAPTER IV
Percentage of Gender
Female
32%
Male
68%
Figure 2: Shows the total number of male and female gathered from the respondents.
The total number of Male Grade 12 ICT respondents is 78 out of 114 the sample size with a percentage of
68%. The total number of Female Grade 12 ICT respondents is 36 out of 114 sample size with a percentage of
32%.
4% 2%
41% 53%
The total number of respondents age of 17 years old is 59 out of 114 the sample size with a percentage of
53%. The total number of respondents age of 18 years old is 45 out of 114 the sample size with a percentage of
19
41%. The total number of respondents age of 19 years old is 7 out of 114 the sample size with a percentage of
4%. The total number of respondents age of 20 years old is 5 out of 114 the sample size with a percentage of 2%.
Table 2
1. Computer virus is a malicious code created by a person.
5 49 4.50-5.00 Excellent
3 18 2.50-3.49 Satisfactory
2 6 1.50-2.49 Fair
1 3 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
49 out of 114 or 42.98% of ICT students are Strongly agree that Computer Virus is a Malicious code
created by a person. 38 out of 114 or 33.33% of ICT students are Agree that Computer Virus is a Malicious code
created by a person. Then the study Weighted Mean is 2.95 and it is interpreted as Satisfactory while the Standard
20
Table 3
2. Computer virus may slow the performance of computer.
5 57 4.50-5.00 Excellent
3 11 2.50-3.49 Satisfactory
2 1 1.50-2.49 Fair
1 2 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
50% of Grade 12 ICT students are Strongly Agree that computer virus may slow the performance of the
computer. 37.72% of Grade 12 ICT students are Agree that computer virus may slow the performance of the
computer. Then the study Weighted mean is 3.13 and it is interpreted as Satisfactory while the Standard deviation
21
Table 4
3. Computer virus can corrupt a file.
5 58 4.50-5.00 Excellent
3 15 2.50-3.49 Satisfactory
2 2 1.50-2.49 Fair
1 1 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
50.88% of Grade 12 ICT students are strongly agree that Computer virus can corrupt a files. 33.33% of
Grade 12 ICT students are Agree that Computer virus can corrupt a file. Then the Weighted mean is 3.11 and it
is interpreted as a Satisfactory while the Standard deviation is 4.63 and interpreted as an Excellent.
22
Table 5
4. Computer virus can destroy a memory or hardware.
5 54 4.50-5.00 Excellent
3 22 2.50-3.49 Satisfactory
2 4 1.50-2.49 Fair
1 4 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
47.37% of Grade 12 ICT students are Strongly agree that Computer virus can destroy a memory or
hardware. 26.32% of Grade12 ICT students are Agree that Computer virus can destroy a memory or hardware.
Then the Weighted mean of this study is 2.96 and it is interpreted as a Satisfactory while the Standard deviation
23
Table 6
5. In order to prevent virus, install an Antivirus and make sure that it is always updated.
5 51 4.50-5.00 Excellent
3 19 2.50-3.49 Satisfactory
2 3 1.50-2.49 Fair
1 1 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
44.74% of Grade 12 ICT2 students are Strongly agree that in order to prevent virus, install an Antivirus and make
sure that it is always updated. 35.09% of Grade 12 ICT students are Agree that in order to prevent virus, install
an Antivirus and make sure that it is always updated. Then the Weighted mean of the study is 3.03 and interpreted
as Satisfactory while the Standard deviation is 4.16 and interpreted as Very satisfactory.
24
Table 7
6. To avoid computer virus, do not try to visit unfamiliar websites.
5 43 4.50-5.00 Excellent
3 12 2.50-3.49 Satisfactory
2 5 1.50-2.49 Fair
1 3 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
37.72% of Grade 12 ICT students are Strongly Agree that in order to avoid Computer virus, do not try to
visit unfamiliar websites. 44.74% of Grade 12 ICT students are Agree that in order to avoid Computer virus, do
not try to visit unfamiliar websites. Then the Weighted mean of the Study is 2.96 and interpreted as Satisfactory
while the Standard deviation is 4.22 and interpreted as 4.22 and interpreted as Very satisfactory.
25
Table 8
7. To make sure your computer is safe, be aware to the existence of the virus.
5 54 4.50-5.00 Excellent
3 11 2.50-3.49 Satisfactory
2 1 1.50-2.49 Fair
1 2 1.00-1.49 Poor
Legend
5- Strongly Agree 4- Agree
3- Neutral 2- Disagree
1- Strongly Disagree
47.37% of Grade 12 ICT students are Strongly Agree that to make sure your computer is safe, be aware
about the existence of Computer virus. 40.35% of Grade 12 ICT students are Agree that in order to avoid
Computer virus, do not try to visit unfamiliar websites. Then the Weighted mean of the study is 3.11 and
interpreted as Satisfactory while the Standard deviation is 4.74 and interpreted as Excellent.
26
5%
YES
NO
95%
108 out of 114 or 95% of Grade 12 ICT students says Yes that they are aware to the existence of Computer
virus. 6 out of 114 or 5.26% of Grade 12 ICT students say No that they are aware to the existence of Computer
virus.
Grade 12 ICT
7%
Everday
28%
Every week
65% Every month
27
74 out of 114 or 65% of Grade 12 ICT student use computer for their computer activities every day. 32
out of or 28% of Grade 12 ICT student use computer for their computer activities every week. 8 out of 114 or
7.02% of Grade 12 ICT student use computer for their computer activities every month.
60
50
48
40 44
30
20
22
10
0
Grade 12 ICT Students
44 out of 114 or 39% of Grade 12 ICT student says that there is a possibility to delete their important files
because of Computer virus. 48 out of 114 or 42% of Grade 12 ICT student says that it can corrupt files because
of Computer virus. 22 out of 114 or 19% of Grade12 ICT student says that it delays my computer activities
28
50
45
47
40
35 39
30
25 28
20
15
10
5
0
Grade 12 ICT Students
39 out of 114 or 34% of Grade 12 ICT students says in order to avoid Computer virus avoid visiting
unfamiliar websites. 28 out of 114 or 25% of Grade 12 ICT students says in order to avoid Computer virus do not
open attachment file. 47 out of 114 or 41% of Grade 12 ICT students says in order to avoid Computer virus
12. If you encounter a computer virus, what are the solutions you can do to destroy the virus.
60
50 53
40
30 33
28
20
10
0
Grade 12 ICT students
29
53 out of 114 or 46% of Grade 12 ICT student that the solution can do to destroy Computer virus is to
download an Antivirus. 28 out of 114 or 25% of Grade 12 ICT students that the solution can do to destroy
Computer virus is to Quickly format your computer. 33 out of 114 or 29% of Grade 12 ICT student that the
solution can do to destroy Computer virus is to call a professional to fix your computer.
30
Chapter V
Summary of Findings
In this chapter stated the conclusion of the study in order to fulfill the purpose where is to prove the
connection of Computer virus to the Computer Activities. It also helps the readers and give them idea to the Virus
on how to interact on it. This research problem would not be solved without the help of Grade 12 ICT students
that answers our question through our questionnaire in which it contains the problem on the study. Using Simple
Random Sampling the researchers made to found the result to the research problem.
Age:
Gender:
Section:
Based on the data that the researchers gather the total number of male respondents in Grade 12 ICT Strand
is 78 with a percent of 68.42%, while the total number of Female respondents in Grade 12 ICT Strand is 36 with
a percent of 31.58%.
Based on the data that the researcher gathered the total number of respondents with the age of 17 is 59
with a percent of 51.75%, while the total number of respondents with the age of 18 is 45 with a percent of 39.47,
while the other total number of respondents with the age of 19 is 4 with a percent of 3.51%, and the total number
Based on the data that the researchers gather Computer virus is a malicious code that created by person
where 49 out of 114 or 42.98% of ICT students are Strongly agree and 38 out of 114 or 33.33% of ICT students
31
Based on the data that the researchers gather Computer virus is related to computers because it also a program
like the program runs at the computer and that it may affect the Computer activities of ICT students that may
cause a lot of problem where 44 out of 114 or 39% of Grade 12 ICT student says that there is a possibility to
delete their important files because of Computer virus. 48 out of 114 or 42% of Grade 12 ICT student says that it
can corrupt files because of Computer virus. 22 out of 114 or 19% of Grade12 ICT student says that it delays my
Based on the data that the researchers gather Computer can do a lot of things in the Computer and by our
research through questionnaire answered by the ICT student where 87.72% said that Computer virus work is to
slow the performance of the Computer. 84.21% of Grade 12 ICT students said that Computer virus can corrupt
files. 53.69% said that Computer virus can destroy memory or hardware.
5.) What is the best way to prevent and stop the virus?
Based on the data gathered by the researchers that the best way to avoid Computer virus is that avoid
visiting unfamiliar websites where 82.46% of Grade 12 ICT students are agree and Strongly agree with this. And
that 87.72% said that ICT students should be aware to the existence of Computer virus so that Computer user be
aware to anything that It may happen to the computer where 95% of ICT students are aware to the virus. The best
way to stop the virus where 53 out of 114 or 46% of Grade 12 ICT student that the solution can do to destroy
Computer virus is to download an Antivirus. 28 out of 114 or 25% of Grade 12 ICT students that the solution can
do to destroy Computer virus is to Quickly format your computer. 33 out of 114 or 29% of Grade 12 ICT student
that the solution can do to destroy Computer virus is to call a professional to fix your computer.
32
APPENDICES
33
34
5. If you encounter a computer virus, what are the solutions you can do to destroy the virus?
Download an antivirus
Quickly format your computer
Call a professional to fix your computer
35
Conclusion
Therefore, we conclude that Computer activities has really an implication through Computer virus, in
where we discovered that computer virus is also a program that can be run through computer and works to destroy
the system of computer because Computer is a program that can control and manipulate Computers where the
Virus main purpose is to destroy the hardware of the Computer and slowly destroy computer. We found out that
the widely spread of Computer virus is that because it can replicate itself and attach to any file and spread through
by downloading or transferring files. We also found out that Computer virus is a dangerous program that can
destroy into anything technological type to change its function and construction of a system. Also discover that
these Computer viruses may affect the student in every time the student use computer to do some activities and
work where it can slow the performance of computer and it result to student no to finish their works. To our study
we also discover that the best way to prevent computer virus is make sure that you activate the firewall in the
36
Recommendation
We are recommending this research for the computer users, the ICT students that they may able to do the
work quickly and efficiently and save a lot of time to proceed with other academic activities and performance
without troubleshooting. Typical computer users that can do the work quickly without interruption and also they
will be provided solid knowledge on how to deal on Computer viruses and why it is in Computer. And also the
teachers who often use computer and laptops for their record sheets. This research studies can be a source of
information how computer virus can get and what are the ways to avoid it. This study helps the ICT students to
freely transfer files from the computer on school without encountering Computer virus.
37
Bibliography
Topic Link/Source
38