The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Education Technology, 2023-07-19 11:16:09

Computing Class 6

Third Edition

Keywords: Computing Class 6

Document Creation Text Wrapping 1. Select the image you want to wrap text around. The Format tab will appear on the right side of the Ribbon. 2. On the Format tab, click the Wrap Text command in the Arrange group. A dropdown menu will appear. 3. Hover the mouse over the various text-wrapping options. A live preview of the text wrapping will appear in the document. When you have found the text-wrapping option you want to use, click it. Alternatively, you can select More Layout Options... to fine-tune the layout. The City School 51 2023-2024


Predefined Wrap Settings 1. Select the image you want to move. The Format tab will appear on the right side of the Ribbon. 2. On the Format tab, click the Position command in the Arrange group. 3. A drop-down menu of predefined image positions will appear. 4. Select the desired image position. The image will adjust in the document, and the text will wrap around it. 4. The text will wrap around the image. You can now move the image if you want. Just click, hold, and drag it to the desired location. 2.6. Working with Tables in Word A table is a grid of cells arranged in rows and columns. Tables are useful for various tasks such as presenting text information and numerical data. In Word, you can create a blank table, convert text to a table, and apply a variety of styles and formats to existing tables. We covered the basics of working with tables in the previous class levels. In this section we look at more advanced features of tables in Word. Checkpoint Border art is a repeated small image that forms a border around the outside of the document margins. Kerning is the amount of space between each character that you type. Cropping lets you focus on only part of an image. The City School 52 2023-2024


Document Creation Table Styles Table styles let you change the look and feel of your table instantly. They control several design elements, including color, borders, and fonts. 1. Click anywhere on the table, then click the Design tab on the right side of the Ribbon. 2. Locate the Table Styles group, then click the More drop-down arrow to see all available table styles. 3. Select the table style you want. The City School 53 2023-2024


Modifying Table Styles When you select a table in Word 2016, the Layout tab appears under Table Tools on the Ribbon. From the Layout tab, you can make a variety of modifications to the table. 4. The selected table style will appear. Following features associated with the table can be controlled from the Layout tab: • Rows and columns: quickly inserts or deletes rows and columns. This can be especially useful if you need to add something to the middle of your table. • Change cell size: manually enter a desired row height or column width for your cells. You can also use the AutoFit command, which will automatically adjust the column widths based on the text inside. • Merge and split cells: merge multiple cells (i.e., combine them into one) or split a cell in two. • Align cell text: set alignment of your text in table and allows to control exactly where the text is located. • Text direction: allows to change the direction of your text from horizontal to vertical. Making your text vertical can add style to your table; it also allows you to fit more columns in your table. • Distribute rows and columns: allows to keep your table looking neat and organized, by distributing your rows or columns equally. The City School 54 2023-2024


Document Creation 2.7. Spelling and Grammar Check When we prepare documents, we sometimes make mistakes. Two common types of mistake are spelling mistakes and grammar mistakes. By default, Microsoft Word checks spelling and grammar automatically as you type, using wavy red underlines to indicate possible spelling problems and wavy green underlines to indicate possible grammatical problems. These mistakes can be corrected using an inbuilt spelling and grammar feature. Following are the steps to run spelling and grammar check: abc 1. From the Review tab, click the Spelling & Grammar command. 2. The Spelling and Grammar pane will appear. For each error in your document, Word will try to offer one or more suggestions. You can select a suggestion and click Change to correct the error. If the program finds spelling mistakes, a dialogue box appears with the first misspelt word found by the spelling checker. The City School 55 2023-2024


3. Word will move through each error until you have reviewed all of them. After the last error has been reviewed, a dialogue box will appear confirming that the spelling and grammar check is complete. Click OK. 2.8. Use of Thesaurus A thesaurus helps you to find words with similar meanings (synonyms). It also shows antonyms words. An antonym is a word with the opposite meaning. 1. Select the word in your document that you want to check. Click Thesaurus on the Review tab. 2. You will see multiple options of the words having a similar meaning. The City School 56 2023-2024


Document Creation 3. To replace your selected word with your desired word from the suggested list, press the down arrow key in front of the desired word and click Insert. 2.9. Find and Replace When you’re working with longer documents, it can be difficult and time consuming to locate a specific word or phrase. Word can automatically search your document using the Find feature, and it allows you to quickly change words or phrases using Replace. To Find Text 1. From the Home tab, click the Find command. Alternatively, you can press Ctrl+F on your keyboard. 2. The Navigation pane will appear on the left side of the screen. Type the text you want to find in the field at the top of the navigation pane. In our example, we’ll type the word we’re looking for. The City School 57 2023-2024


3. If the text is found in the document, it will be highlighted in yellow and a preview of the results will appear in the navigation pane. Alternatively, you can click one of the results below the arrows to jump to it. 4. When you are finished, click the X to close the navigation pane. The highlight will disappear. To Replace Text At times, you may discover that you have made a mistake repeatedly throughout your document— such as misspelling a person’s name—or that you need to exchange a particular word or phrase for another. You can use Word’s Find and Replace feature to quickly make changes. In our example, we will use Find and Replace to change the title of a magazine so it is abbreviated. The City School 58 2023-2024


Document Creation 1. From the Home tab, click the Replace command. Alternatively, you can press Ctrl+H on your keyboard. 2. Type the text you want to find in the Find what: field. Type the text you want to replace it within the Replace with: field. Then click Find Next. 3. Word will find the first instance of the text and highlight it in gray. Review the text to make sure you want to replace it. In our example, the text is part of the title of the paper and does not need to be replaced. We’ll click Find Next again to jump to the next instance. The City School 59 2023-2024


4. The text will be replaced. When you’re done, click Close or Cancel to close the dialog box. Q uick tip When it comes to using Replace All, it’s important to remember that it could find matches you didn’t anticipate and that you might not actually want to change. You should only use this option if you’re absolutely sure it won’t replace anything you didn’t intend it to. 2.10. Document Views Word 2016 has a variety of viewing options that change how your document is displayed. You can choose to view your document in Read Mode, Print Layout, or Web Layout. These views can be useful for various tasks, especially if you are planning to print the document. Read Mode is optimized for reading a document on the computer screen. In Full Screen Reading view, you also have the option of seeing the document as it would appear on a printed page. Print Layout is the default layout and the one you see most often. The City School 60 2023-2024


Document Creation 2.11. Mail Merge Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. When performing a Mail Merge, you will need a Word document (you can start with an existing one or create a new one) and a recipient list, which is typically an Excel workbook. Web Layout is suitable if you are designing a web page in Word. Web Layout view shows how your document will look like a web page. Open an existing Word document, or create a new one. From the Mailings tab, click the Start Mail Merge command and select Step-by-Step Mail Merge Wizard from the drop-down menu. The City School 61 2023-2024


The Mail Merge pane appears and will guide you through the six main steps to complete a merge. The following example demonstrates how to create a form letter and merge the letter with a recipient list. From the Mail Merge task pane on the right side of the Word window, choose the type of document you want to create. In our example, we’ll select Letters. Then click Next: Starting document to move to Step 2. Select Use the current document, then click Next: Select recipients to move to Step 3. Step 1: Step 2: The City School 62 2023-2024


Document Creation Now you’ll need an address list so Word can automatically place each address into the document. The list can be in an existing file, such as an Excel workbook, or you can type a new address list from within the Mail Merge Wizard. 1. Select Use an existing list, then click Browse to select the file. 2. Locate your file, then click Open. Step 3: The City School 63 2023-2024


3. In the Mail Merge Recipients dialog box, you can check or uncheck each box to control which recipients are included in the merge. By default, all recipients should be selected. When you’re done, click OK. 4. Click Next: Write your letter to move to Step 4. Step 4: Now you are ready to write your letter. When it’s printed, each copy of the letter will be nearly identical. Only the recipient data (such as the name and address) will be different. You will need to add placeholders for the recipient data so Mail Merge knows exactly where to add the data. The City School 64 2023-2024


Document Creation To insert recipient data: 1. Place the insertion point in the document where you want the information to appear. 2. Choose one of the placeholder options. In our example, we’ll select Address block. 3. Depending on your selection, a dialog box may appear with various customization options. Select the desired options, then click OK. The City School 65 2023-2024


4. A placeholder will appear in your document (for example, «AddressBlock»). 5. Add any other placeholders you want. In our example, we’ll add a Greeting line placeholder just above the body of the letter. 6. When you’re done, click Next: Preview your letters to move to Step 5. The City School 66 2023-2024


Document Creation Step 5: 1. Preview the letters to make sure the information from the recipient list appears correctly in the letter. You can use the left and right scroll arrows to view each version of the document. 2. If everything looks correct, click Next: Complete the merge to move to Step 6. 1. Click Print to print the letters. Step 6: The City School 67 2023-2024


2. A dialog box will appear. Decide if you want to print All of the letters, the current document (record), or only a select group, then click OK. In our example, we’ll print all of the letters. 3. The Print dialog box will appear. Adjust the print settings if needed, then click OK. The letters will be printed. The City School 68 2023-2024


Document Creation 2.12. Printing Document 1. Select the File tab. Backstage view will appear. 2. Select Print. The Print pane will appear. Navigate to the Print pane and select the desired printer. 3. Enter the number of copies you want to print. Select any additional settings if needed. Click Print. The City School 69 2023-2024


Printing a Page Range If you would like to print individual pages or page ranges, you will need to separate each entry with a comma. For example: 1, 3, 5-7, or 10-14. Navigate to the Print pane. In the Pages: field, enter the pages you want to print. Click Print. Checkpoint Find & Replace allows to search and change words or phrases in the document. Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. The City School 70 2023-2024


1. The header appears in the top margin, while the footer appears in the bottom margin. 2. Hyperlinks provide access to websites and email addresses directly from your document. 3. A page border is a border that appears outside the margins on each page. 4. Kerning is the amount of space between each character that you type. 5. Cropping may be helpful when a picture has a lot of content and you want to focus on only part of it. 6. Tables are useful for various tasks such as presenting text information and numerical data. 7. Microsoft Word uses wavy red underlines to indicate spelling problems and wavy green underlines to indicate possible grammatical problems. 8. The Find feature allows to search the document whereas the Replace feature allows you to quickly change words or phrases. 9. Read Mode is optimized for reading a document on the computer screen. 10. Print Layout is the default layout and the one you see most often. 11. Web Layout is suitable if you are designing a web page in Word. Web Layout view shows how your document will look like a web page. 12. Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. Let’s Review My Notes The City School 71 2023-2024


Stay Online...Stay Safe S M A R T Stay safe.... Do not give out your personal information Do not communicate with strangers you meet online Do not accept messages and friend requests from people who are strangers Check the authenticity of any news or person from reliable sources Tell your parents or teachers if someone or something makes you uncomfortable


Student Learning Outcomes ISTE Student Standard Coverage 1. Understand the function of the web browsers, URL and address bar 2. Use the bookmark feature to save the websites 3. Use and navigate through the browser history 4. Use the web to search information and refine the search process through the use of special keywords. 5. Understand the function of internet protocols 6. Understand the privacy protection and intellectual property rules 7. Understand the hazards of the internet and ways to safeguard from the internet threats. 8. Understand the concept of digital privacy, digital citizenship, digital citizenship, netiquette and cyber bullying 9. Familiarize with online Microsoft Office 365 After going through this chapter, students will be able to: Empowered Learner Knowledge Constructor Digital Citizen 1a 2a 2b 3a 3b 3d Creative Communicator 6d Global Collaborator 7a 7b E-Safety and Going Online


3.1. What is a Web Browser 3.2. Web Browser Anatomy URLs and Address Bar A web browser is a type of software that allows you to find and view websites on the Internet. There are many different web browsers, but some of the most common ones include Google Chrome, Internet Explorer, Safari, Microsoft Edge, and Mozilla Firefox. There are certain elements that are common in almost all the browsers. These are explained below: Each website has a unique address, called a URL (short for Uniform Resource Locator). It’s like a street address that tells your browser where to go on the Internet. When you type a URL into the browser’s address bar and press Enter on your keyboard, the browser will load the page associated with that URL. In the example below, we have typed www.bbc.com/travel into the address bar. Microsoft edge Safari Mozilla firefox Chrome Internet explorer The City School 74 2023-2024


e-Safety and Going Online Whenever you see a word or phrase on a website that’s blue or underlined in blue, it’s probably a hyperlink or link for short. You might already know how links work, even if you have never thought about them much before. Links are used to navigate the Web. When you click a link, it will usually take you to a different web page. You may also notice that your cursor changes into a hand icon whenever you hover over a link. The Back and Forward buttons allow you to move through websites you have recently viewed. You can also click and hold either button to see your recent history. The Refresh button will reload the current page. If a website stops working, try using the Refresh button. If you find a website you want to view later, it can be hard to memorize the exact web address. Bookmarks, also known as Favourites, are a great way to save and organize specific websites so you can revisit them again and again. Simply locate and select the Star icon to bookmark the current website. Links Navigation Buttons 3.3. Bookmarks and Browser History The City School 75 2023-2024


Your browser will also keep a history of every site you visit. This is another good way to find a site you visited previously. To view your history, open your browser settings—usually by clicking the icon in the upper-right corner—and select History. 3.4. Search Engine Searching the Web With billions of websites online today, there is a lot of information on the Internet. Search engines make this information easier to find. A search engine is a web-based tool that enables users to locate information on the World Wide Web. Search engines use programs, often referred to as spiders, robots or crawlers, to search the internet. These programs are used by search engines to build an index of the internet. There are many different search engines you can use, but some of the most popular include Google, Yahoo!, and Bing. The City School 76 2023-2024


e-Safety and Going Online 1. To perform a search, you will need to navigate to a search engine in your web browser, type one or more keywords— also known as search terms—then press Enter on your keyboard. In this example, we will search for recipes. 2. After you run a search, you’ll see a list of relevant websites that match your search terms. These are commonly known as search results. If you see a site that looks interesting, you can click a link to open it. If the site doesn’t have what you need, you can simply return to the results page to look for more options. The City School 77 2023-2024


3. Alternatively, you can perform a web search directly from your address bar, although some have a separate search bar next to the address bar. Simply type your search terms and press. Enter to run the search. If you are still having trouble finding exactly what you need, you can use some special characters to help refine your search. For example, if you want to exclude a word from a search, you can type a hyphen (-) at the beginning of a word. So, if you wanted to find cookie recipes that don’t include chocolate, you could search for recipes cookies -chocolate. You can also search for exact words or phrases to narrow down your results even more. All you need to do is place quotation marks (“ “) around the desired search terms. For example, if you search for recipes “sugar cookies”, your search results will only include recipes for sugar cookies, instead of any cookies that happen to use sugar as an ingredient. These techniques may come in handy in certain cases, but you probably won’t need to use them with most searches. Search engines can usually figure out what you are looking for without these extra characters. We recommend trying a few different search suggestions before using this method. Refining the Search Checkpoint A web browser is a type of software that allows to find and view websites on the internet. Bookmarks, also known as Favourites, provide a way to save and organize specific websites so you can revisit them again and again The City School 78 2023-2024


e-Safety and Going Online There may be times when you are looking for something more specific, like a news article, picture, or video. Most search engines have links at the top of the page that allow you to perform these unique searches. You can use the extra search tools to narrow down your results even more. These tools will change based on the type of content you are looking for, but in this example, we can filter our images by size, colour, image type, and more. So, if you wanted to find cookies with pink frosting, you could search for images that are mostly pink. Content-Specific Search The City School 79 2023-2024


3.5. Internet Protocols In the field of telecommunications, a protocol is the set of standard rules for data representation, signaling, authentication and error detection required to send information over a communications channel. When computers connect and transmit data between each other on the Internet, they follow a set of rules to do so. These rules are universal; all computers throughout the Internet must follow them. Otherwise, the Internet would not function as computers would not be able to transmit data in a meaningful and useful way. These rules are called protocols. The Internet Protocol (IP) family contains a set of related (and among the most widely used) network protocols. Beside Internet Protocol itself, higher-level protocols like TCP, HTTP, SMTP, POP3 and FTP all integrate with IP to provide additional capabilities. The Transmission Control Protocol (TCP) is one of the main protocols of the Internet Protocol Suite. TCP is part of the popular TCP/IP” combination used by the Internet. The Internet Protocol, or IP, makes sure data on the internet gets to the right place. Then TCP makes sure the data is put in the right order, and none of it is missing. TCP also helps to control traffic on the internet so it does not get overloaded. TCP TCP/IP The City School 80 2023-2024


e-Safety and Going Online Hypertext Transfer Protocol (often abbreviated to HTTP) is a communications protocol. It is used to send and receive web pages and files on the internet. HTTP works by using a user agent to connect to a server. The user agent could be a web browser or spider. The server must be located using a URL or URI. This always contains http:// at the start. It normally connects to port 80 on a computer. FTP, also known as File Transfer Protocol, is a protocol for the rapid, simple transmission of files across a network supporting the TCP/IP protocol. This network is generally the Internet, or a local network. FTP is a way of accessing files on another computer. FTP uses the ClientServer architecture, meaning that there is a server, that holds the files, and does the authentication, and a client, or the end-user, who is accessing the files. The server listens on the network for connection requests from other computers. The client can make a connection to the FTP server by using FTP client software. Once connected and authenticated (via rsh or SFTP) the client can do things such as uploading files to the server, downloading files (taking the server’s files and putting them on his own computer) from the server, and renaming, deleting files on the server, changing file permissions, etc. HTTP http:// FTP FTP The City School 81 2023-2024


SMTP POP3 Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP is specified for outgoing mail transport and uses TCP port 25. In computing, the Post Office Protocol (POP) is an Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over an Internet connection. POP and Internet Message Access Protocol or IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both. A wiki is a database of pages which people can edit/modify while connected on the Internet. The building blocks of wikis are the comments from visitors. It is website or database developed collaboratively by a community of users, allowing any user to add and edit content. One can generally edit a page in real time, search the wiki’s content, and view updates since the last visit. Each wiki has The POP3 protocol has been developed through several versions, with version 3 (POP3) being the current standard. It uses TCP port 110. SMTP server client client 3.6. Wiki W The City School 82 2023-2024


e-Safety and Going Online a specific purpose and a bunch of wiki pages that are maintained by the users of that Wiki. Wikis can be used for a variety of purposes like documentation, knowledge management or just a team repository of information. Additional features can include calendar sharing, live Audio and video conferencing and more. Access this website to check the list of wiki websites: https://en.wikipedia.org/wiki/ List_of_wikis A blog site, by contrast, does allow visitors to add content, but does not usually allow them to change or edit previous comments from others. 3.7. Intellectual Property Intellectual property (or IP for short) refers to creations of the human mind (also known as the “intellect”) that are a non-physical (or intangible) form of property. Just like physical (or tangible) property, intellectual property is something that people can own. Intellectual property is the original expression of an idea that later becomes something tangible. It is important to cite sources you used in your research for several reasons: • To show your reader you have done proper research by listing sources you used to get your information. • To be a responsible scholar by giving credit to other researchers and acknowledging their ideas. • To avoid plagiarism by quoting words and ideas used by other authors. • To allow your reader to track down the sources you used by citing them accurately in your paper by way of footnotes, a bibliography or reference list. The City School 83 2023-2024


3.8. Internet Hazards 3.9. Types of Computer Viruses Trojan Computer Virus How Viruses Spread The term Computer Virus was first used in 1984 by Fred Cohen. Cohen was the first to suggest that one computer program could infect another one. He later noted that a virus could spread through a computer system or network to infect other computers. Viruses are spread in a number of ways: Use of pirated software Through exchange of diskettes macro-viruses hidden in documents. Downloads from the internet. email attachements and emails A Trojan is not a computer virus in the sense that it doesn’t get into the computer and self replicate. A Trojan is software that appears to function in a certain way (such as a program that user may have downloaded to remove viruses or spyware), when in reality it performs another action, unknown to the user. A Trojan is not always harmful and damaging to the computer, but it can open a back-door for hackers to get into the computer and cause damage. The City School 84 2023-2024


e-Safety and Going Online Worms Spyware Computer Worms are like a virus in the fact that they do self-replicate themselves within the computer system. However, a computer worm does not have to attach itself to a program in the system like a computer virus does in order to function. Also, unlike a computer virus that generally corrupts and modifies files on the computer to cause damage, a computer worm generally localizes its damage to the computer network by causing increased activity from the affected computer. Spyware is a newer type of program that damages the computer system. Spyware is also not a computer virus in the traditional sense, but it is harmful. Spyware is used to take some control over the computer user’s interactions with their computer. This is all done with out the consent of the owner of the computer. Spyware does more than monitor the computer user’s behavior; it can even collect a lot of personal information. Spyware can change computer settings, install additional software, redirect web browser activity, access websites that will permit dangerous viruses to get onto the computer, and slow connection speeds. Malware, short for malicious software, is a kind of software that can be installed on a computer without approval from the computer’s owner. There are different kinds of malware that can hurt computers, such as viruses and spyware. These programs can steal passwords, delete files, collect personal information, or even stop a computer from working at all. Computer security or antimalware software is usually good at stopping malware from installing itself. When security software isn’t installed, malware can get into the computer. Getting rid of malware can be difficult, even when using programs designed to remove it. Malware Checkpoint Internet protocol refer to the set of rules followed by the computers when they connect and transmit data between each other. Intellectual property refers to creations of the human mind that are a non-physical (or intangible) form of property. The City School 85 2023-2024


Ransomware Phishing Adware Ransomware is a type of malware. It restricts access to the computer system that it infects, and demands a ransom be paid to the creator(s) of the malware. This is in order for the restriction to be removed. Some forms of ransomware encrypt files on the system’s hard disk. Others may simply lock the system and display messages intended to persuade the user to pay. Phishing is a way that criminals get sensitive information (like usernames or passwords). It is a method of social engineering. Very often, phishing is done by electronic mail. This mail appears to come from a bank or other service provider. It usually says that because of some change in the system, the users need to re-enter their usernames/passwords to confirm them. The emails usually have a link to a page that looks almost like that of the real bank. Phishing allows criminals to get access to bank accounts, or other accounts like shopping, auction or gaming accounts. It can also be used for identity theft. Adware, also sometimes known as advertising-supported software, is any type of software packages that will automatically display, play, or download advertisements to a computer after the software is installed on the computer or during the time the application is being used. 3.10. Digital Citizenship If you are a citizen, this means you belong to a group of people. You could be a citizen of your classroom or your neighbourhood. Being a digital citizen means you are a part of the group of people that use technology to communicate. There are rules that you need to follow when you are a digital citizen, to protect yourself and to protect others. Consumers reported losing more than $3.3 billion to fraud in 2020, Nearly $1.2 billion of losses reported last year were due to imposter scams, while online shopping accounted for about $246 million in reported losses from consumers. The City School 86 2023-2024


e-Safety and Going Online 3.11. Digital Resilience 3.12. Online Risks and Threats Examples of Cyber Bullying Cyber Bullying A digitally resilient person will be able to: Know what to do to seek help. Learn from their experiences. Recover when things go wrong. Understand when they are at risk online. Cyber bullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. If someone is repeatedly unkind or harasses another person online, then they are a cyberbully. Cyberbullying usually involves people you know. It is often accompanied by traditional, offline, bullying. People use the internet in all kind of ways. Just like offline, not everyone in the world will say, or do kind things. Some people can be unkind on purpose, just because they are hiding behind a screen. There are many threats associated with use of Internet and one should know to safeguard themselves from these threats. Writing hurtful things through instant messagingm, text messaging or online games. Posting derogatory messages on social media to humiliate a person or communiity Posting or sharing embarrasing videos or photos over the social media. Creating a fake profile of someone to humiliate or hurt them. The City School 87 2023-2024


How to Avoid Cyber Bullying Netiquette Do not reply to the messages sent by bully. Block all the messages from the bully. Keep all the e-mails and messages that the bully sends. Report the bullying to the parent or a trusted adult. If you merge the words internet and etiquette together you get the word netiquette. This refers to how to behave online. Following the rules of netiquette involves exploring the digital world in a way that is positive for both yourself and others you may encounter along the way. Here are some simple rules of netiquette that can help make your experience online safer and more enjoyable. • Check before sharing images or videos of your friends or other people. They may find them embarrassing or simply not want them to be made public. It is also important to bear in mind that photos and videos of other people is their personal data, so you should get permission before sharing. • Think before you post anything. Is it going to upset, embarrass or offend anyone? This includes writing nasty comments on a celebrity’s social media post. Trolling people that you don’t know is still unkind! • Check if information is true and reliable to the best of your knowledge before accidentally spreading what could be misleading information. • Think carefully about how you may come across in emails, messages or comments. For example, writing in capital letters to your teacher may come across as rude or even aggressive, even if you don’t intend it to Nettiquette The City School 88 2023-2024


e-Safety and Going Online 3.13. Internet Safety Tips • Don’t give anyone your password, name, address, the name of your school or any • information about your family. • Don’t talk to strangers on the Internet. • Don’t agree to meet anyone in person that you’ve met online. • Don’t fill in a profile that asks for your name and address. • Don’t visit a chat room without an adult’s / parent’s permission. • Don’t stay online if you see something you think your parents won’t like. • Don’t post pictures of yourself without your parents’ permission. • Do not download or install anything on your computer without your parents’ permission. • If you have any questions about something you read, ask your parent or guardian. • If you are talking to someone online and they make you uncomfortable, remember you don’t have to talk back to them. • If someone you don’t know tries to add you as a friend online, or sends messages, be wary that the name and photo they are using may not really be their real one. 3.14.Getting Familiar with Microsoft Office 365 Office 365 is a fully-featured web-based version of Microsoft Office. It comes with the new Microsoft 365 subscription which includes Windows 10, MS Teams and Office 365. Office 365 is a fully-featured web-based version of Microsoft Office. It comes with the new Microsoft 365 subscription which includes Windows 10, MS Teams and Office 365. Office 365 Why to Use Office 365 Checkpoint Malware, or malicious software, is a kind of software that can be installed on a computer without approval from the computer’s owner. Netiquette to how to behave online. Phishing is a way that criminals get sensitive information. The City School 89 2023-2024


1. Open your web browser and navigate to portal.office.com. and login to your Microsoft account by using your provided CSN email address and password. 2. After signing-in, you will be redirected to a page where you can see all the office 365 apps. From here you should have access to your e-mail with Outlook, your online storage with OneDrive, your Learning Management System with Microsoft Teams, and your Office apps with Word, Excel, PowerPoint, and Access. You can also access your contacts with People. Getting Started with Office 365 The City School 90 2023-2024


e-Safety and Going Online Create New Files 1. Click the Start New icon, then select the icon for the type of file you want to create from the pop-up window—Word document, Excel workbook, PowerPoint presentation, Forms survey, Forms quiz, or Sway page. 2. Alternatively, click the icon for the program you wish to use. Click the All Apps icon to see additional apps. As an example, we will use Word, but you can choose any of the Office apps. The online versions of Excel, PowerPoint, and OneNote work similarly to Word in that they offer all the basic commands and features. The City School 91 2023-2024


3. Click the icon for Word to launch the new document page, where you can select a template or create a blank document. 4. In this example, we will start with blank template. 5. By default, your document is saved in the root location of your OneDrive storage space. If you plan to work with a lot of different documents, you may want to create specific folders in OneDrive to store these files. If you want to save a copy of your document in a specific folder, click File > Save As > Save a copy to OneDrive The City School 92 2023-2024


e-Safety and Going Online 6. Navigate your OneDrive space and select the folder to which you want to save your document, then click Save. Afterwards, your document automatically saves periodically so you don’t have to manually keep saving it as you do with the desktop version of Word. 7. Alternatively, you can also click on Download a Copy to save a copy of the file as is to your desktop if you want to edit it offline. You can also download the file as a PDF. The City School 93 2023-2024


Instead of starting a new document, you can open an existing file a few different ways. If you’re already in the app for that file, click the File menu and you’ll see a list of recent documents. Click the one you want to open. Open an Existing File The City School 94 2023-2024


Let’s Review 1. URL stands for Uniform Resource locator. 2. A search engine is a web-based tool that enables users to locate information on the World Wide Web. 3. TCP makes sure the data is put in the right order, and none of it is missing. 4. Hypertext Transfer Protocol (HTTP) is used to send and receive web pages and files on the internet. 5. File Transfer Protocol (FTP) allows the rapid, simple transmission of files across a network supporting the TCP/IP protocol. 6. Simple Mail Transfer Protocol (SMTP) is an Internet standard for (e-mail) transmission across IP networks. 7. Post Office Protocol (POP) used by local e-mail clients to retrieve e-mail from a remote server over an Internet connection. 8. A wiki is a database of pages which people can edit/modify while connected on the Internet. 9. Computer Worms self-replicate themselves within the computer system. 10. Spyware can even collect a lot of personal information. 11. Ransomeware restricts access to the computer system that it infects, and demands a ransom be paid to the creator(s) of the malware. 12. Office 365 is a fully-featured web-based version of Microsoft Office. My Notes! The City School 95 2023-2024


Simple Colors Visual Hierarchy Typography Dimensions Do not overwhelm your design with text and images Make use of cohesive color palette in your design. Ensure that important elements in your design stand out. Avoid using too many font styles in your design. It is important to the dimensions of your design. Important Design Tips


Student Learning Outcomes ISTE Student Standard Coverage 1. Familiarize with Edraw Max’s user interface 2. Use available templates to create designs and plans 3. Work with shapes, objects, connector lines and arcs. 4. Manipulate color, resize and change objects and connector lines 5. Insert text on the design 6. Work with themes, styles and effects to make the design aesthetically appealing. 7. Ensure consistency in their design work by using rulers and grid lines. 8. Save and print the design work. After going through this chapter, students will be able to: Empowered Learner Innovative Designer 1a 1d 4a 4c 4d Creative Communicator 6c 6d Modular Designing


4.1. Getting Started with EDraw Max 4.2. EDraw Max Interface Home 1. Quick Access Toolbar: commands here are always visible. Right click a ribbon command to add it here. EDraw Max is an extremely powerful all-in-one diagramming tool that can serve all of your purposes. Whether you need to draw flowcharts, fishbone diagrams, UML diagrams or design floor plans, office layouts, you can find what you want in EDraw Max. EDraw user interface is similar to Microsoft Program interface, which can minimize the learning curve. EDraw user interface includes 7 major menus: File, Home, Insert, Page Layout, View, Symbols and Help. These menus are introduced in detail with illustrations below. A menu’s background turns white after selected. Clicking another menu turns off the menu selected before. The Home tab has following options: The City School 98 2023-2024


Modular Designing 2. Libraries: gives access to a wide-range of assets. You can search different shapes for your design through the Search feature in the library section. 3. Page layout: allows to change page layout, change the page setup, theme and background. 4. Style: apply quick style and change fill, line style and change effect. The City School 99 2023-2024


5. Drawing area: apply quick style and change fill, line style and change effect. 6. Footer: consist of drawing area (the white area), page label, color bar (to change colours), zoom bar (to zoom in and out). The City School 100 2023-2024


Click to View FlipBook Version