Professional Documents
Culture Documents
Grade 6
Registration - online registration means becoming a member of a website, you fill in an online
form and provide information about yourself to the owner of the site.
Cookie – is a small file that is stored on your computer when you visit a website, saves information
about the way you use web pages.
Type of cookies:
Cybercrime Methods:
• Identity theft - criminal steals personal information (names and addresses) to pretend they
are someone else and uses stolen information and pretends to be the person they stole
information from.
• Phishing – criminals create a fake website that looks like the official website such as banks
or internet shopping sites. The criminal writes a fake email that looks like it comes from
the bank or internet shopping website.
• Scamming – criminal sends email asking for money, or someone sends an offer, selling
things at lower price.
• Hacking – criminal breaks into a computer system to holds personal information and
steal files.
Malware – is a software that a criminal install on a computer. Some steals personal information
others damage files or stops a computer from working.
• Virus – spread and infect files it meets. The attach themselves to files which make it hard
to cure.
• Trojan – hidden inside another program, the malware is released and starts to work when
the program is used.
• Ransomware – encrypts all the data on a computer and the victim receives a message
demanding payment to remove the encryption.
• Spyware – sits on a computer and records what the use id typing. Uses to discover login
ID and password.
• Adware – place unwanted adverts on a computer. Usually not dangerous but it can be
annoying.
Ant-virus software – or AV software, prevents malware from doing damage to your computer.
Firewall – surrounds and protect your computer like the walls of a castle. Checks all data before
it allows the data to pass through the gates in the wall.
Using computers safely
1.4 Cyberbullying
Cyberbullying – bullying that is done on the internet. Cyberbully is a person who uses the
internet to bully people.
Methods of Cyberbullying:
1. Be careful not to join in. When you see a post that makes fun of someone, never click the
like button.
2. Say something positive about the person being bullied, Show support.
3. Offer support and friendship, encourage them to talk to adults about the bullying.
If you are the one bullied:
1. Collect evidence. Take screenshots of the post so that you have a record even if the post
are deleted.
2. Talk to someone you can trust. Talk to a friend or your teacher.
3. Don’t respond to the bullying.
4. Spend some time offiline.
Intellectual property – something that you have created using your mind (your intellect) and that
you own.
Piracy – criminals making copies of music, games and films and sell the copies often over the
internet.
Creative Commons – owners of images makes their images available free of charge on the
internet with this special license.
Giving credits to the owner by giving citations. The following information are needed to give
citation to the owner of the image:
Definition of Terms:
Stage – The background, this is where you change the background of the game.
Sprite – A single character that you can program to move or act in a particular way.
Costume – A look for the sprite and the one sprite can have more than one of these for different
looks.
Given the following set of Block Commands, what are the expected outcome?
Q1.
Q2: Which one of the following segments of codes would be the most precise block to use to
draw a blue square in Scratch?
Q3. What value would be held by the “name1” variable and “name2” variable at the end of the
end of this program?
Q4: What would the output of Say weather be at the end of the program?