The Problem and Its Scope
The Problem and Its Scope
1.1 Introduction
In our present day, technology made a rampant significance from doing things easily.
Through the help of technologies, society can easily perform well on their works. On the other
hand, computer literate individuals are also increasing, from professionals to beginner and made
benchmark on making their own systems and programs. That is why some computer literate
individuals can easily get what they want, like for some users that prefer to download crack
software instead of original copies because they can easily achieve certain software from
different websites on the internet that provide crack software without paying. While on the
original copy you have to spend more money to get the certain software or program.
Software cracking are known for the computer literate individuals, it’s a way of copying
the use of commercial software It can be downloaded by everyone who commonly uses
computer in a torrent sites that provides crack software that was cracked by professional
programmer who cracked the commercial software.
Downloading crack software may have a risk, viruses and computer malware are the
common example. It may bring error or malware to your phone and computer and may
possibility destroyed your computer.
The scope of this study may take place in Iligan Medical Center College Basic Education
Department and with the respondents of Grade 11 and Grade 12. To know how safe or dangerous
the crack software and how sure they are when they downloaded crack software.
1.2 Statement of the Problem
This study aims to delineate the credibility of crack softawre to grade 12 stuents of Iligan
Medical Center College Basic Education Department (IMCC-BED) and in percentage
considering that it is now rampant nowadays to download crack software or software, compared
to the commercial copy.
1. How many students prefer to download crack software rather than getting its original
copy?
2. In what percent do the crack software bring malware error or virus to your phone or
computer?
Downloading the original copy is sometimes expensive for students to buy, and we want
to fully understand how the crack software credible to the respondents who download crack
software.
This study will help explicate how the crack software have credible approach to the one
who download even though it’s illegal and also to know in what percent does the cracks software
may possibility bring, such as viruses and malware error.
This study focuses on the credibility of the crack software among the grade 12 students
and the percentage, from each strand within Iligan Medical Center College Basic Education
Department (IMCC-BED) by using stratified method to determine the number of students to be
included in the data (through surveys) , in total of 30 respondents. The researchers want to know
the credibiity of crack software to the grade 12 students and measured through percentage.
1.5 Hypothesis
H1 The presence of crack software have a significant effect to the students of grade 12 in
Iligan Medical Center College Basic Education Department.
Independent Dependent
Variable Variable
Credibility Trusted
Not trusted
Positve
Negative
Computer Literate- having sufficient knowledge and skill to be able to use computers; familiar
with the operation of computers.
Crack Software- Software cracking is the modification of software to remove or disable features
which are considered undesirable by the person cracking the software, especially copy protection
features or software annoyances like nag screens and adware.
Computer Program- is a collection of instructions that performs a specific task when executed
by a computer.
Computer System consists of hardware components that have been carefully chosen so that they
work well together and software components or programs that run in the computer.
Malware- malicious software, is a blanket term for any kind of computer software with
malicious intent. Most online threats are some form of malware.
Virus- a piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
Chapter II
According to (Evans, 2019), that from year to year, the evolution of technology is one of
staggering promise and opportunity – as well as uncertainty. The future may be unknown, but
digital advancement continues to reshape our world in ways that encourage people to form new
habits, find new ways to work together, and become better human beings. And, in most cases,
these changes translate into a range of opportunities and disruptions across every industry.
The latest study by( Miniwatts Marketing Group, 2019) reveals that the Internet is
defined as the worldwide interconnection of individual networks operated by government,
industry, academia, and private parties. Originally the Internet served to interconnect laboratories
engaged in government research, and since 1994 it has been expanded to serve millions of users
and a multitude of purposes in all parts of the world.
In a matter of very few years, the Internet consolidated itself as a very powerful platform
that has changed forever the way we do business, and the way we communicate. The Internet, as
no other communication medium, has given an International or, if you prefer, a "Globalized"
dimension to the world. Internet has become the Universal source of information for millions of
people, at home, at school, and at work.
Internet is changing all the time. Two things, in our opinion, have marked it's evolution
recently: the social web and mobile technology. These two innovations have changed the way
people use the Internet. In the social web people have found a new way to communicate. Since
its creation in year 2004, Facebook has grown into a worldwide network of over 2,230 million
active users. Mobile technology, on the other hand, has made possible a much greater reach of
the Internet, increasing the number of Internet users everywhere.
The Internet continues to be the most democratic of all the mass media. With a very low
investment, anyone can have a web page in Internet. This way, almost any business can reach a
very large market, directly, fast and economically, no matter the size or location of the business.
With a very low investment, almost anybody that can read and write can have access and a
presence in the World Wide Web. Blogging has consolidated the social media and the people
everywhere are expressing and publishing their ideas and opinions like never before.
Recognizing the crack files, whether or not it's possible to recognize cracking depends on
what’s being cracked. For example, software companies likely won’t know if someone has
cracked their software. Likewise, students using the public Wi-Fi at the corner café won’t know
if someone has cracked the Wi-Fi network and is capturing their vulnerable data, such as banking
info or passwords. That said, it might be obvious that your computer has been cracked if your
friends and colleagues start getting phishing emails from your email address.
As stated by (Modern Trends, 2018) Cracked software’s are free and easy to download
from the web with so many crackers seriously sitting for a long time in front of a computer just
in order to crack a protected software. With so many students using laptops and computers, it is
rather difficult for them to buy softwares that are costlier than their budget. There are a lot of
freewares out there, but most of them are designed for Linux and the rest of them have limited
functionality. When we literally want a software very badly we need to buy it and I have a very
strong reason for supporting this claim.
If you are a businessman you can never afford to download a cracked software. Cracked
softwares are softwares obtained by reversing the one written by the original developer. There
are many things which run behind the scene when you are installing a cracked software. If you
have downloaded your software from a torrent site, be sure that your computer is under the risk
of being attacked by a malicious program.
A research study by (Ventayen & Ventayen, 2018)from Pangasinan Universtiy that based
on the result of the survey, 80% of the respondents practice piracy because they can't afford the
content. Followed by 48.3% with the reason that the respondents don’t like to pay for it. 35% of
the respondents find it hard to purchase, and 21.7% says that “others are doing it too.” It shows
that the main reason for piracy is the respondents cannot afford original content and doesn’t want
to invest money in the content. The result of the study implies that the estimated losses for the
software industry are approaching more than $60 billion , thus the main reason why software
industry failed to earn money is because the users doesn’t want to spend for the content, in this
regard, the only way to avoid losses is to fight piracy.
Chapter 3
Methodology
In this chapter it presents the methods that the study used. It also describes the subjects
of the study, the instruments to be used, the procedure that the researcher used in data
gathering. This was conducted in order to know the credibility of a crack software among
grade 12 students in Iligan Medical Center College Basic Education Department.
3.1 Research Design
The methodology gives directly the research question which is to gather information and
to identify those individuals who downloaded crack software on the internet.
The researchers used Quantitative analysis. Quantitative analysis was used in order to
validate the gathered information through survey as a reference in gaining accurate information,
a series of steps, according to a pre-specified plan of action.
4. Identify some alternative ways to prevent the possible approach of crack software to the
students.
There are 40 respondents of the study. The respondents of this study were identified as
enrolled grade 12 senior high school students at Iligan Medical Center College Basic Education
Department who are a computer literate individual.
3.4 Gathering of Data