You are on page 1of 9

Revision Paper for End of Semester Test

Grade 6

Unit 1: Staying Safe Online

1.1 Collecting Data

Registration - online registration means becoming a member of a website, you fill in an online
form and provide information about yourself to the owner of the site.

E-commerce – another word for internet shopping or buying online.

Cookie – is a small file that is stored on your computer when you visit a website, saves information
about the way you use web pages.

Type of cookies:

• Essential cookie – needed to make a website work as designed.


• Performance cookie – collect information about how you use a website. Owner uses this
information to improve the performance of the website.
• Functionality cookie – record what you do on website to personalize the web page for
you.
• Advertising cookie – information is used to personalize adverts displayed on a web page.
1.2 Danger Online

Cybercrime - crimes committed online/through the internet. Cybercriminal is someone who


uses the internet to commit their crimes.

Cybercrime Methods:

• Identity theft - criminal steals personal information (names and addresses) to pretend they
are someone else and uses stolen information and pretends to be the person they stole
information from.
• Phishing – criminals create a fake website that looks like the official website such as banks
or internet shopping sites. The criminal writes a fake email that looks like it comes from
the bank or internet shopping website.
• Scamming – criminal sends email asking for money, or someone sends an offer, selling
things at lower price.
• Hacking – criminal breaks into a computer system to holds personal information and
steal files.

Malware – is a software that a criminal install on a computer. Some steals personal information
others damage files or stops a computer from working.

• Virus – spread and infect files it meets. The attach themselves to files which make it hard
to cure.
• Trojan – hidden inside another program, the malware is released and starts to work when
the program is used.
• Ransomware – encrypts all the data on a computer and the victim receives a message
demanding payment to remove the encryption.
• Spyware – sits on a computer and records what the use id typing. Uses to discover login
ID and password.
• Adware – place unwanted adverts on a computer. Usually not dangerous but it can be
annoying.

1.3 Protecting your computer

Ant-virus software – or AV software, prevents malware from doing damage to your computer.

How AV software works:

Every piece of malware has a fingerprint called signature. AV software contains a


database of the malware signature. AV software continually checks the files on your computer and
if it finds a ma malware signature, it puts the file in quarantine – this means that computer cannot
open the file.

Firewall – surrounds and protect your computer like the walls of a castle. Checks all data before
it allows the data to pass through the gates in the wall.
Using computers safely

• Use email safely – Be aware of email attachments and links provided.


• Use the web safely – go only to website that you trust. Be careful with the files that you
download.
• Update software – the more updated software the better the chance against malware.
• Keep password safe – do not share your passwords and make passwords difficult for
hackers to access.

1.4 Cyberbullying

Cyberbullying – bullying that is done on the internet. Cyberbully is a person who uses the
internet to bully people.

Methods of Cyberbullying:

• Harassment – A bully sends threatening messages by text message of instant message. It


often makes threats. This can be very frightening.
• Impersonation – a bully chooses a target and sends messages that pretends to be the
target, the aim is to cause trouble between the target and their friends.
• Exclusion – a bully ends message that publicly exclude the target from social groups or
event.
• Dissing – bully circulates rumors (untrue story) about the target.
• Photographs – uses cameras to take photo of the target and send the photo to groups.

The Effect of Cyberbullying

What should you do if you experience cyberbullying:

1. Be careful not to join in. When you see a post that makes fun of someone, never click the
like button.
2. Say something positive about the person being bullied, Show support.
3. Offer support and friendship, encourage them to talk to adults about the bullying.
If you are the one bullied:

1. Collect evidence. Take screenshots of the post so that you have a record even if the post
are deleted.
2. Talk to someone you can trust. Talk to a friend or your teacher.
3. Don’t respond to the bullying.
4. Spend some time offiline.

2.5 Use content responsibly

Intellectual property – something that you have created using your mind (your intellect) and that
you own.

Copyright, trademarks and patents:

Piracy – criminals making copies of music, games and films and sell the copies often over the
internet.

Creative Commons – owners of images makes their images available free of charge on the
internet with this special license.

Giving credits to the owner by giving citations. The following information are needed to give
citation to the owner of the image:

Plagiarism – pretending that someone else’s work is your own work.


Unit 1: Programming Essentials using Scratch

Motion Looks Sound

Events Control Sensing


Operation Variables

Definition of Terms:

Stage – The background, this is where you change the background of the game.

Sprite – A single character that you can program to move or act in a particular way.

Costume – A look for the sprite and the one sprite can have more than one of these for different
looks.

If – A script line that decides if another script runs.

Forever – script that keeps running until it is told to stop.

Repeat – script that runs a set number of times.

Wait – Pauses the program for a set amount of time.

Given the following set of Block Commands, what are the expected outcome?

Q1.
Q2: Which one of the following segments of codes would be the most precise block to use to
draw a blue square in Scratch?

Q3. What value would be held by the “name1” variable and “name2” variable at the end of the
end of this program?
Q4: What would the output of Say weather be at the end of the program?

Q5 : Explain what the following block of codes does.

Q6: Explain what the following block of codes does.


Q7: Explain what the following block of codes does.

Q8: Explain what the following block of codes does.

Q9: Explain what the following block of codes does.

Q10: What is the difference of these two blocks?

You might also like