1. We can use Microsoft Excel to a. count the data b. do basic arithmetic operations c. do sorting and filtering of data 2. Data processing has six stages: a. Collecting b. Preparing c. Input d. Processing e. Output f. Storage ? 1. Open the file named ‘Competition Score’. This file lists the marks of three tests done by four teams. Using the functions of Microsoft Excel, find out the following. How many members are there in each team? Who are the members in each team? What is the average mark of Ploy? Who scored the lowest mark in Test 1? Who scored the highest mark in Test 2? Who has the highest average mark? How many participants scored 80 and below in Test 3? How many participants have 50 and above for the average mark? Who has the greatest difference in marks between Test 1 and Test 3? A note for teacherS To download the ‘Competition Score’ file, scan this QR code or go to http://tiny.cc/1mivhz . 48 Computing Science Primary 5
2. Collect data from the Internet on the population and area of each of these countries. Thailand Saudi Arabia Finland Japan Niger Singapore Record your data in Microsoft Excel. Calculate the population densities of these countries. Among these countries, find out the country with the largest area the smallest population the highest population density the lowest population density Carry out some research on the Internet to find out if there are any reasons for such distribution of population among the six countries. Present your findings. 3. Carry out this project in groups of 10. Your teacher will identify a few unused or vacant lands in your area. Each group selects one of the unused or vacant lands. You need to carry out a survey to find out the opinions of the local people on how the land should be developed. They may want the land to be turned into a housing project, community garden, theme park, shopping center and others. Present your findings in your class. The best presentation will be posted in your school‛s website. Chapter 3 49 Data processing
Chapter 4 Uses of the Internet The Internet is a worldwide system of computer networks connecting millions of computers. Users from one computer can communicate and access data with permission from other computers. Internet The Internet has brought many changes to our lives. It has changed the way we live and do things. The Internet has impacted almost every sector of industry in the world also. Almost everything is available online now. How do we benefit from the Internet? Watch this video to understand better about the Internet. Who invented it? Who owns it? Who controls it? http://tiny.cc/jncuhz
Chapter 4 51 Internet Communication The Internet has opened up many ways to communicate with others conveniently. We can easily talk to someone on the other side of the Earth instantly and almost without any cost incurred. Email or electronic mail is a paperless method of sending letters to others through the Internet. Email is very fast compared to the conventional mail. It takes merely a few seconds to reach its destination. Moreover, we can attach along other files such as pictures and documents. We need to have an email address in order for the mail to reach us. Every email address is unique and made up of three parts. In 2019, over half of the population of the world used emails. It is estimated that more than 246 billion of emails are sent daily. [email protected] The username identifies us personally. It might be our name or initial. The domain refers to the mail server hosting the email account. The ‘at’ or @ symbol separates the username and the domain.
52 Computing Science Primary 5 When writing an email, it is important to follow email etiquette especially for businesses. Email etiquette is a set of generally accepted rules when we write or reply emails. It helps to get our message across and conveys a sense of respect to the recipients. Here are some Do’s and Don’ts of email etiquette. 1. Have a clear and brief subject line. 2. Use proper language. Avoid overusing the emoticons and emoji. Never use all capitals as it looks as if you are shouting. Do not use too many acronyms such as LOL and ASAP. 3. Use proper punctuation to ensure the recipients get the meaning of the sentences. Use bullet points and numbered lists to make it easier for the recipients.
Chapter 4 53 Internet 4. If you need to send attachments, always try to make the attachments as small as possible. We can compress big files or send images with lower resolutions. 5. Always read your message before hitting the send button. Also always check the recipient’s name and email address before sending the email. Do you have an email account? Since you are under 13, most of the email service providers need parental consent. Get your parents to help you to sign up an email account. 1 Prepare an email predicting how you would communicate with your relatives or friends who stay far away if there was no Internet. Make sure you write with good manners. Send the email to your teacher and parents.
54 Computing Science Primary 5 Have you seen your parents or older siblings or relatives using social media? Why do they use it? Ask them to find out. Social media are the websites and application software that allow users to connect with their friends and family. It builds virtual communities that create and distribute information. Social media have many features. They include instant messaging, voice calls, video calls, video conferencing and blogging Instant messaging is the sending and receiving of text messages between two or more persons. Images, emoticons and emoji can be inserted to make the conversation more informative and fun.
Chapter 4 55 Internet Instead of sending text, we can also contact our friends via voice calls just like any ordinary phone calls with social media. By having video calls feature, we can have face-to-face conversation with our friends via the Internet. In addition, we can make video calls to a few friends at the same moment. This is known as video conferencing. Many businesses use video conferencing to have meetings or discussions among their workers or with their clients and suppliers of different places. Find out the advantages and disadvantages of using social media. Next, what is a blog?
56 Computing Science Primary 5 A blog is an online diary or journal or news that is updated regularly. It is usually presented in a conversational style. It may contain text, images and animations. If most of its content is in the video form, it is known as a Vlog or video blog. When we are communicating online, we should show some proper manners as if we were communicating in person. It is important for us to consider our behaviors when communicating on the Internet. Be respectful. Always remember we are dealing with other people, not a machine. Everyone has different feelings and opinions. So, we should treat them the same way as we would in person. Be careful of how we write. Avoid using strong words, capital letters and exclamation marks. They might be easily misinterpreted online. Remember that the receiver does not see your facial expression or hear your voice tone. Writing in all capital letters means we are yelling. Never post anything when you are angry. Take some time to cool off first. You might have a different view and be able to think more reasonably later. Visit this website to know more about blogs. http://tiny.cc/96euhz
Chapter 4 57 Internet Respect others’ privacy. Never post a picture of someone or tag them without their permission. They might not want their photos or stories to appear online. Keep your messages and posts positive. Do not be rude, negative and sarcastic when sending messages or posts. Also, avoid sending anything that we are not too sure about such as rumors. What happens if we do not show good manners when communicating online? Why? Commercial Nowadays, we can easily buy things online and have them delivered to our doorstep. Food, grocery items, clothing, cooking utensils and many more are sold on the Internet. We can make payments via the Internet. We need not leave our house and queue up at the payment counters. Money transfer via the Internet has make our life easy.
58 Computing Science Primary 5 Payment online can be made with a credit or debit card. We just need to enter the card information. Do you think we should ensure our credit or debit cards are always safe with us? What happens if they get stolen? Advertising is done online too. Online advertising is very effective for businesses to reach and find new customers globally. Job vacancies are also advertised on the Internet. Nowadays, many online businesses are exploring the use of live streaming to connect to their customers. Live streaming is the broadcasting of live video to audience over the Internet. With this new technology, companies can showcase their products and interact with the audience, and encourage the audience to purchase the products in real time. The audience can ask questions and get feedback almost immediately. However, if you are doing live streaming on your own, you should always make sure that your content is not sexually suggestive, violent and dangerous you do not share any of your personal information your video is set to broadcast to friends or followers only you turn off the location service on the camera or application software you are careful with what you say and do not offend or embarrass anyone
Chapter 4 59 Internet Information There is so much information on the Internet. A lot of information is created and shared online every day. We can use it to enrich our minds with knowledge. We can conduct researches online about almost any subject. The information found online can be in text, audio, video or image form. For example, when we are going to visit a country we have not been to, we may search online for information on its interesting places. We can find out about the weather condition, things to expect, locations of the places, and their entrance fees and operating hours. We can revise our lessons or even polish up our skills with some free courses offered online. There are unlimited exercises that we can do to improve our academic achievement. Let’s say that your teacher is teaching about the reproduction of flowering plants. You may be curious about how non-flowering plants such as ferns and pines reproduce. You may ask your teacher or search for the answers online yourself. Ferns reproduce by releasing a lot of tiny spores.
60 Computing Science Primary 5 Entertainment We use the Internet for entertainment too. We listen to music, watch videos and play games online. Some of us also read e-books for leisure. List how you use the Internet. From the list, group them into four categories as shown below. 2 Communication Commercial Information Entertainment
Chapter 4 61 Internet Evaluating information reliability There is so much information online. Just key in the phrase ‘population Thailand 2019’ in any search engine. It will give a long list of websites related to that phrase. As we know, not all information found online is accurate. Unlike printed materials, online information is not regulated to meet the standards of accuracy and fairness. Therefore, it is important for us to evaluate the reliability of the information effectively. Consider the following criteria and always ask yourself the questions on the next page. Which website should we use to find the population of our country? Which is accurate?
62 Computing Science Primary 5 Purpose Whom is the website for? Is it meant for schoolchildren, the general public or specialists? Are the terms used suitable for the targeted audience? What is the purpose? Is it to explain, inform or sell a product? Authority Who is the author? Is he/she mentioned on the website? Are his/her qualifications and credentials listed? Is he/she an expert in this particular field? Is he/she attached to any academic institution or credible organization? Can we find other references to him/her elsewhere? Accuracy Are the sources of the information mentioned? Can we find those sources and verify them? Is the information consistent with other information found in other sources? Are there many spelling and grammar errors? When is it published? Is it updated regularly? When is the last update? Objectivity Is the author biased? Is the information a fact or just the author’s opinion? Does the author express from just a point of view? Does it list only its advantages or disadvantages, or both?
Chapter 4 63 Internet Also always check the domain which is a part of the web address. It can guide us if the information is published by a credible source. Domain Types of websites .edu Schools, colleges, universities and educational institutions .gov Government agencies .com Commercial organizations .org Non-profit organizations .net Internet service providers, network services, online technology companies and database providers Usually, the websites with domains such as .edu, .gov and .org are likely to be more reliable than those with .com domain. Let’s say you are required to write a report on Air Pollution. Find a suitable website as a reference for that report. Now, you need to prepare a presentation on why you chose that website. Your presentation should include these: Who is its targeted audience? Is the language used easy for you to understand? Who is the author? Is he or she a specialist? Is the information accurate? Why? Is the information a fact or an opinion? What does its domain tell you? 3
64 Computing Science Primary 5 Danger of the Internet The Internet is a really wonderful invention. We can use it for many purposes. However, the Internet also poses danger. There are many bad and dangerous people on the Internet who can manipulate others especially children to do things they should not do and take advantage of others or harass others. Cyberbullying When someone uses the media technology to harass, threaten or embarrass someone, it is called cyberbullying. It could be in the form of messages, posts, videos or even pictures. It is usually hard to trace back to the original sender. We might not know how many have seen the messages, videos or pictures. Cyberbullying can lead to serious problems. The victim may feel not safe and powerless. Some may feel angry and would like to take revenge. Some may feel alone and isolated. What should we do if we were bullied online? Ignore – Do not respond as that is what might give the bully the power to carry on. Do not share the nasty emails or messages with others as we will not know where it will end up.
Chapter 4 65 Internet Tell someone – Do not suffer alone. Tell a trusted adult such as your parents or teacher. They will help you. Block the bully or bullies – When we block someone on the social media, he or they will no longer be able to contact you. Most social media have such option. Save the evidence – It is better to save or screenshot the nasty messages you received. We can show it to someone who can help later. Sanit’s football teammates sent many text messages to him, blaming him for the team’s loss. They also said he was not good enough to be in the team. 4 Sanit was afraid to tell his coach and his family. He used to love playing football. However, now he felt very sad and was thinking to quit the team. If you were Sanit, what would you do? Would you... go and scold them face-to-face? reply their text by apologizing and promising to play better? inform and discuss with your coach? just quit the team and distance yourself from them? You are the one who caused our team to lose! You should not be on the team! Get lost! When are you leaving the team? You’re really a loser!
66 Computing Science Primary 5 Sexual grooming There are many bad people with bad intention in the world. With the Internet, these bad people can easily target anyone as they use fake identities behind the devices. We may think we know whom we are interacting with online, but we cannot be really sure unless he or she is a school friend or a relative. Some use false identities and make friends online. They will try to gain a child’s trust by pretending to share common interests and background, offering an understanding ear and flattering the child to make him or her feel special. Then, they will encourage the child to meet or even introduce the child to pornographic materials. This is definitely very dangerous as the child can be sexually abused or exploited. Grooming means the process of an adult developing a friendship with a child with the intention of committing sexual offences. It can also refer to the things we do to keep ourselves clean and look nice.
Chapter 4 67 Internet There are a few stages in sexual grooming. 1. Gain trust by listening and sympathizing the child. 2. Gradually introduce sex into conversation or expose the child to pornographic materials. 3. Worsen the relation between the child and his parents. 4. Try to meet the child alone for sexual encounters. 5 I’m Mimi. So, which school do you attend? She said I was on my computer the whole day, did not help her out. Do you know what a boyfriend and a girlfriend do? Moms are the same, they never understand us. Let me be your boyfriend and I’ll tell you. Good. Who are you? Ya great idea! No... what? Haha. No. Why? Ok. Why? What happened? I’m Jim. 12 years old. No need to tell her. Just say you are going to the library. Mimi, do you have a boyfriend? Hi! How are you? Bored. Want to go ice skating? So, see you at 2? I argued with mom just now. 1 week later 2 weeks later 3 weeks later Love to, but Mom will not allow.
68 Computing Science Primary 5 Read the conversations on the previous page. Discuss these. Does Mimi know Jim? Who is Jim? Should Mimi disclose her disagreement with her mother to Jim? Does Jim really understand Mimi or is he just trying to gain her trust? Should Mimi lie to her mother about her whereabouts? What would happen to Mimi if Jim is really a bad guy? If you were Mimi, what should you do when Jim tried to make friends with you? when Jim tried to ask you out alone? Cybercrime Cybercrime is a crime or an unlawful activity carried out using a computer. Most cybercrimes involve money. Cybercrime becomes a serious threat to everyone worldwide, not just in Thailand. Why? It could be someone sending emails containing scams, trying to get some money form unsuspected victims. Some steal someone’s personal information and have access and control over the victim’s finances.
Chapter 4 69 Internet Some make unauthorized access to devices and steal personal, business and financial information. They may also spy on online activities. They may withhold the information for ransom. Some use the Internet to spread hate and incite terrorism. There are some who share and give out illegal content online such as pornographic materials. Read the text above. Discuss with your classmates. Why do you think WannaCry virus spread that fast? If your computer is affected by WannaCry virus, will you pay to get back your data? Why? What should we do to protect our computers from virus attacks? 6 In 2017, there was a computer virus named WannaCry. This virus attacked some computer systems and locked people out of their computers. It demanded some money in return for the files. It is believed the virus infected over 200,000 systems in 116 different countries in just four days of its discovery. Some hospitals, delivery companies, telecom service providers, automobile manufacturers and railway services were affected badly.
70 Computing Science Primary 5 Staying safe online With the increasing cases of cyberbullying, cybercrime and sexual grooming, the Internet seems like a dangerous place these days. Each day the risks are growing and changing rapidly. We need to protect ourselves from the danger on the Internet so that we can enjoy the benefits without being a victim. Here are some tips to do so. Do not give out your personal information. You should not give out your personal information such as your name, home address, telephone numbers, passwords, name of school and bank account numbers online. Do not talk to strangers online or meet them. The people we meet online are not always who they claim to be. We do not really know them. If you really need to meet them, meet at a public place with a trusted adult like your parents. Do not respond to strangers‛ requests. If you receive any stranger’s requests online, inform your parents or teachers. Do not respond to them. Do not simply open any suspicious attachments in the emails. Inform your parents or teachers if you receive any texts that make you sad or angry. It might be a cyberbullying case. Do not reply those texts or emails. Do not believe everything on the Internet. There are a lot of scams online. Not everything on the Internet is true.
Chapter 4 71 Internet Ahtit received an email as shown below one day. Dear whoever, Forward this email to five people that you know within 24 hours. If you do it, good luck will be with you. Otherwise, bad luck will follow you for the next five years. Make a wise decision. Regards, Whatever Ahtit is nervous and undecided what to do. Discuss. Should he forward the email to five of his friends? If yes, how would his friends feel? Should he ignore the email? If yes, what would happen? Should he inform his parents and ask for their advice? 7 1. The Internet is very useful. 2. We can communicate via emails and social media. 3. We should have good manners when communicating online. 4. We can buy things, pay bills and advertise online too. 5. There is a lot of information on the Internet. 6. We use the Internet for entertainment. 7. Not all online information is accurate. Therefore, we must evaluate the reliability of the information. 8. There are dangers on the Internet such as cyberbullying, sexual grooming and cybercrime. 9. We need to protect ourselves from these threats. ?
72 Computing Science Primary 5 1. List four examples on how we can communicate on the Internet. 2. How do you entertain yourself on the Internet? 3. Someone named Baby texted Ace. Read the message below. Hi Ace, this is Baby. I have been watching you. You’re cute. I like you. Can we meet tomorrow? Who are you? If you were Ace, what would you do? Explain.
Chapter 4 73 Internet 4. Aom was gathering information about Majapahit empire. She searched online and found many related websites. How is Aom going to evaluate the reliability of the websites? Write a simple guide for Aom’s reference. 5. Read this story. Answer the following questions. Joe and Danny were good friends. They did projects together. Then, a new student, Nick joined their class. Soon, Danny and Nick became friends and Joe felt left out. Later, Danny spent more time with Nick than with Joe. Joe felt angry and betrayed. He soon created an online chat group that encouraged others to talk bad about Danny. Danny felt frustrated and lonely. (a) What should Danny do? (b) Was Joe at fault? How should Joe react when he found out that Danny spent more time with Nick than with him? (c) Is this an example of cyberbullying?
74 Computing Science Primary 5 1. Four friends are looking at a computer. What do they see? A 1 B 2 C 3 D 4
75 Let's Play 2. Complete the pattern accordingly.
76 Computing Science Primary 5 3. Redraw the animals in the squares below. Then, color them.
77 Let's Play 4. Continue the patterns.
78 Computing Science Primary 5 Notes