Monday Oct 22 Block A In-Class Exercise: Malware

What to do

Watch the videos, and possibly use Google, to answer these questions in a Google Docs document. Print and Hand In the Questions and Answers

  1. What is malware?
  2. Why do people write malware?
  3. How does malware get on your computer?
  4. What is a virus? What must the user do for a virus infection to occur?
  5. What is a trojan?
  6. What is ransomeware?
  7. What is spyware?
  8. What are worms?
  9. What is the difference between viruses and worms?
  10. Social engineering is an attack that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. How does Social Engineering assist hackers with the distribution of malware?
  11. What is a botnet? Why do people write them?
  12. According to the video shown, what are the five worst viruses?
  13. What can you do to protect your computer from malware?
  14. What command line tool allows you to monitor network communications with your computer?
  15. If your computer gets infected, what should you do?


  1. Difference Between Viruses, Worms, Malware, Trojans, Ransomware, and Spyware
  2. Modern Malware Practical Demonstration
  3. Botnets Explained
  4. DDos Attacks
  5. 5 Worst Viruses Ever
  6. Protect Your Computer from Malware
  7. How to tell if your Windows computer has been hacked
  8. Hijacked Computer: What to Do
Over the next week you will work through all the tutorials in: w3 Intro to HTML 5.

Useful HTML Resources
  • Valid HTML5 document (Explanation)
  • HTML Validator
  • HTML Reference
  • All of this material will be assessed by periodic quizzes.
  • Read What is a Blog? (Skip over the part about setting it up on Bluehost)
  • Read 8 Essential Elements of a Successful Blog Post
  • Design your blog site for this course. Build it.
  • Watch What is a Digital Dossier?
  • Write a blog that addresses the following:
  • Search yourself on Google. What are the top ten results that actually link to you? (If you cannot find anything on yourself, search one of your parents.)
  • If someone who did not now you searched you (or your parent) online, what impression would they get about you (or your parent)?
  • Does your digital dossier give an accurate impression of who you (or your parent) are?
  • What would you like to change about your digital dossier? Or if you searched your parent, what would you people to see when they search you in 5 years?
  • How could you go about making that happen?