Q3 Safe

8. Troubleshooting


In this Quest you will be doing some work at home on your family computer by checking on the type of virus protection you have installed.

Key Vocabulary

Malware: Malware is software that is intended to damage or disable computers and computer systems.

Spyware: Spyware is software that aids in gathering information about a person or organization without their knowledge.

I Can Statement

  • run anti-virus software


1. Watch the movie at the top of this page (direct link to the recording)

Individuals or companies can monitor what you are doing on your computer by installing spyware. Some ways that you can tell your computer might be infected  include sudden changes in the behavior of the computer. Be sure your operating system is up to date.

2. Tonight: If you have a computer at home, check to make sure it has an up-to-date active antivirus software installed. If you don't have a computer at home, check with a relative or friend.

Popular antivirus software includes:

BitDefender Antivirus Plus and Kaspersky Anti-Virus (rated best products by PC magazine for 2015) both for a PC Windows computer

Sophos and Avast Free have the top 2015 ratings for a Mac (Tom's Guide 2015).  

There are many more very good programs, the important thing is to make sure one is being used, and it has been kept up-to-date. When you open the antivirus program you should receive a report that tells if it is up to date. Is the computer protected? If not, you can help them out and make a recommendation to the owner based on research you can do about the best anti-virus programs and prices. 

Windows Defender

3. What is a hacker and what do they do?

Check out the answer at "How Stuff Works"

Hacked: Some small stores recently added a program card called "Square Reader" that lets people with iPads and iPhones purchase items with their credit card information. In August 2015, it was reported that a hacker created a program that will record (or steal) the credit card information from a person using it, and then let them (the hacker) make purchases using the stolen information. 

Have a discussion in small groups in your classroom about this type of activity. Ask someone to take notes in a word processing document. Make a list of some things you and your family can do to be safe in this electronic age (remember the suggestions in the video above). 

4. When your list is done, share it with the rest of your class and create one big list that your class can post and share with your friends and family.

BONUS Game Activity - Learn more about hackers, phishing, viruses and a Trojan horse by playing this game from NSTeens called Website Warrior.

Completing this Quest

When you are done with your class list, share it with others and save a copy for your digital portfolio.

Check off this Quest on the 21t4s roadmap 

I am ready for the final Quest, Trouble!

ISTE and Common Core Standards

ISTE Standards•S

1. Empowered Learner
a. articulate and set personal learning goals, developing strategies leveraging technology to achieve them, and reflect on the learning process itself to improve learning outcomes
c. use technology to seek feedback that informs and improves their practice and to demonstrate their learning in a variety of ways
d. understand the fundamental concepts of technology operations, demonstrate the ability to choose, use and troubleshoot current technologies, are able to transfer their knowledge to explore emerging technologies

Common Core Standards

CCSS.ELA-Literacy.CCRA.W.4 Produce clear and coherent writing in which the development, organization, and style are appropriate to task, purpose, and audience.

CCSS.ELA-Literacy.CCRA.W.5 Develop and strengthen writing as needed by planning, revising, editing, rewriting, or trying a new approach.

CCSS.ELA-Literacy.CCRA.W.7 Conduct short as well as more sustained research projects based on focused questions, demonstrating understanding of the subject under investigation.