The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by mudassir.islam, 2022-01-04 01:04:16

Computing E-Book Grade 6

The City School 2021-2022




Text Wrapping

Document Creation
1. Select the image you want to wrap text around. The Format tab will appear on the
right side of the Ribbon.
























2. On the Format tab, click the Wrap Text command in the Arrange group. A drop-

down menu will appear.

























3. Hover the mouse over the various text-wrapping options. A live preview of the text

wrapping will appear in the document. When you have found the text-wrapping
option you want to use, click it. Alternatively, you can select More Layout Options...
to fine-tune the layout.






















51

The City School 2021-2022




4. The text will wrap around the image. You can now move the image if you want. Just

click, hold, and drag it to the desired location.
















Predefined Wrap Settings


1. Select the image you want to move. The
Format tab will appear on the right side

of the Ribbon.
2. On the Format tab, click the Position

command in the Arrange group.
3. A drop-down menu of predefined image

positions will appear.
4. Select the desired image position. The

image will adjust in the document, and
the text will wrap around it.



2.6. Working with Tables in Word


A table is a grid of cells arranged in rows
and columns. Tables are useful for various

tasks such as presenting text information Checkpoint
and numerical data. In Word, you can

create a blank table, convert text to a Border art is a repeated small image that
table, and apply a variety of styles and forms a border around the outside of the
document margins.
formats to existing tables. Kerning is the amount of space
between each character that you type.
We covered the basics of working with Cropping lets you focus on only part of

tables in the previous class levels. In this an image.
section we look at more advanced features of

tables in Word.










52

The City School 2021-2022



Table Styles

Table styles let you change the look and feel of your table instantly. They control
Document Creation
several design elements, including color, borders, and fonts.

1. Click anywhere on the table, then click the Design tab on the right side of the

Ribbon.























2. Locate the Table Styles group, then click the More drop-down arrow to see all
available table styles.























3. Select the table style you want.




























53

The City School 2021-2022




4. The selected table style will appear.





















Modifying Table Styles

When you select a table in Word 2016, the Layout tab appears under Table Tools on

the Ribbon. From the Layout tab, you can make a variety of modifications to the table.














Following features associated with the table can be controlled from the Layout tab:

• Rows and columns: quickly inserts or deletes rows and columns. This can be

especially useful if you need to add something to the middle of your table.
• Change cell size: manually enter a desired row height or column width for your

cells. You can also use the AutoFit command, which will automatically adjust the
column widths based on the text inside.

• Merge and split cells: merge multiple cells (i.e., combine them into one) or split a cell
in two.

• Align cell text: set alignment of your text in table and allows to control exactly
where the text is located.

• Text direction: allows to change the direction of your text from horizontal to vertical.
Making your text vertical can add style to your table; it also allows you to fit more

columns in your table.
• Distribute rows and columns: allows to keep your table looking neat and organized,

by distributing your rows or columns equally.










54
54

The City School 2021-2022



2.7. Spelling and Grammar Check


When we prepare documents, we sometimes

make mistakes. Two common types of mistake
are spelling mistakes and grammar mistakes.

By default, Microsoft Word checks spelling and abc
grammar automatically as you type, using wavy Document Creation

red underlines to indicate possible spelling
problems and wavy green underlines to indicate

possible grammatical problems. These mistakes
can be corrected using an inbuilt spelling and

grammar feature. Following are the steps to run
spelling and grammar check:


1. From the Review tab, click the Spelling & Grammar command.














2. The Spelling and Grammar pane will appear. For each error in your document,

Word will try to offer one or more suggestions. You can select a suggestion and
click Change to correct the error. If the program finds spelling mistakes, a dialogue

box appears with the first misspelt word found by the spelling checker.



































55

The City School 2021-2022





3. Word will move through each error until you have reviewed all of them. After the
last error has been reviewed, a dialogue box will appear confirming that the spelling

and grammar check is complete. Click OK.
















2.8. Use of Thesaurus



A thesaurus helps you to find words with similar meanings (synonyms). It also shows
antonyms words. An antonym is a word with the opposite meaning.


1. Select the word in your document that you want to check. Click Thesaurus on the

Review tab.





















2. You will see multiple options of the words having a similar meaning.






























56

The City School 2021-2022



3. To replace your selected word with your desired word from the suggested list, press

the down arrow key in front of the desired word and click Insert.
Document Creation
















2.9. Find and Replace



When you’re working with longer documents, it can be difficult and time consuming to
locate a specific word or phrase. Word can automatically search your document using

the Find feature, and it allows you to quickly change words or phrases using Replace.


To Find Text

1. From the Home tab, click the Find command. Alternatively, you can press Ctrl+F on

your keyboard.

















2. The Navigation pane will appear on the left side of the screen. Type the text you
want to find in the field at the top of the navigation pane. In our example, we’ll type

the word we’re looking for.


























57

The City School 2021-2022




3. If the text is found in the document, it will be highlighted in yellow and a preview of
the results will appear in the navigation pane. Alternatively, you can click one of the

results below the arrows to jump to it.
























4. When you are finished, click the X to close the navigation pane. The highlight will
disappear.




























To Replace Text


At times, you may discover that you have made a mistake repeatedly throughout your

document— such as misspelling a person’s name—or that you need to exchange a
particular word or phrase for another.

You can use Word’s Find and Replace feature to quickly make changes. In our
example, we will use Find and Replace to change the title of a magazine so it is

abbreviated.











58

The City School 2021-2022





1. From the Home tab, click the Replace command. Alternatively, you can press
Ctrl+H on your keyboard.
Document Creation




















2. Type the text you want to find in the Find what: field. Type the text you want to

replace it within the Replace with: field. Then click Find Next.






















3. Word will find the first instance of the text and highlight it in gray. Review the text to
make sure you want to replace it. In our example, the text is part of the title of the

paper and does not need to be replaced. We’ll click Find Next again to jump to the
next instance.































59

The City School 2021-2022






4. The text will be replaced. When you’re done, click Close or Cancel to close the

dialog box.






















2.10. Document Views


Word 2016 has a variety of viewing options that change how your document is

displayed. You can choose to view your document in Read Mode, Print Layout, or Web
Layout. These views can be useful for various tasks, especially if you are planning to

print the document.


Read Mode is optimized for reading a document on the computer screen. In

Full Screen Reading view, you also have the option of seeing the document as
it would appear on a printed page.



Print Layout is the default layout and the one you see most often.








Q uick tip



When it comes to using Replace All, it’s important to remember that it

could find matches you didn’t anticipate and that you might not actually
want to change. You should only use this option if you’re absolutely sure it

won’t replace anything you didn’t intend it to.













60

The City School 2021-2022





Web Layout is suitable if you are designing a web page in Word. Web Layout
Document Creation
view shows how your document will look like a web page.


















2.11. Mail Merge



Mail Merge is a useful tool that allows you to produce
multiple letters, labels, envelopes, name tags, and

more using information stored in a list, database, or
spreadsheet. When performing a Mail Merge, you will

need a Word document (you can start with an existing
one or create a new one) and a recipient list, which is

typically an Excel workbook.





Open an existing Word document, or create a new one. From the Mailings tab, click

the Start Mail Merge command and select Step-by-Step Mail Merge Wizard from the
drop-down menu.



































61

The City School 2021-2022







The Mail Merge pane appears and will guide you through the six main steps to
complete a merge. The following example demonstrates how to create a form letter
and merge the letter with a recipient list.


Step 1:


From the Mail Merge task pane on the right side of the Word window, choose the type
of document you want to create. In our example, we’ll select Letters. Then click Next:

Starting document to move to Step 2.































Step 2:

Select Use the current document, then click Next: Select recipients to move to Step 3.



































62

The City School 2021-2022



Step 3:

Now you’ll need an address list so Word can automatically place each address into
Document Creation
the document. The list can be in an existing file, such as an Excel workbook, or you can
type a new address list from within the Mail Merge Wizard.




1. Select Use an existing list, then click Browse to select the file.








































2. Locate your file, then click Open.




































63

The City School 2021-2022



3. In the Mail Merge Recipients dialog box, you can check or uncheck each box to
control which recipients are included in the merge. By default, all recipients should

be selected. When you’re done, click OK.

























4. Click Next: Write your letter to move to Step 4.
































Step 4:


Now you are ready to write your letter. When it’s printed, each copy of the letter will
be nearly identical. Only the recipient data (such as the name and address) will be

different. You will need to add placeholders for the recipient data so Mail Merge knows
exactly where to add the data.















64

The City School 2021-2022




To insert recipient data:

1. Place the insertion point in the document where you want the information to
Document Creation
appear.





















2. Choose one of the placeholder options. In our example, we’ll select Address block.
































3. Depending on your selection, a dialog box may appear with various customization
options. Select the desired options, then click OK.



























65

The City School 2021-2022




4. A placeholder will appear in your document (for example, «AddressBlock»).




















5. Add any other placeholders you want. In our example, we’ll add a Greeting line

placeholder just above the body of the letter.





















6. When you’re done, click Next: Preview your letters to move to Step 5.











































66

The City School 2021-2022



Step 5:


1. Preview the letters to make sure the information from the recipient list appears
Document Creation
correctly in the letter. You can use the left and right scroll arrows to view each

version of the document.
















2. If everything looks correct, click Next: Complete the merge to move to Step 6.


























Step 6:

1. Click Print to print the letters.


































67

The City School 2020-2021






2. A dialog box will appear. Decide if you want to print All of the letters, the current
document (record), or only a select group, then click OK. In our example, we’ll print

all of the letters.































3. The Print dialog box will appear. Adjust the print settings if needed, then click OK.
The letters will be printed.

















































68

The City School 2021-2022




2.12. Printing Document

Document Creation
1. Select the File tab. Backstage view will appear.





















2. Select Print. The Print pane will appear. Navigate to the Print pane and select the

desired printer.






















3. Enter the number of copies you want to print. Select any additional settings if

needed. Click Print.

































69

The City School 2021-2022





Printing a Page Range



If you would like to print individual pages or Checkpoint

page ranges, you will need to separate each
entry with a comma. For example: 1, 3, 5-7, or Find & Replace allows to search and
change words or phrases in the
10-14. document.
Navigate to the Print pane. In the Pages: field, Mail Merge is a useful tool that allows you
to produce multiple letters, labels,
enter the pages you want to print. Click Print. envelopes, name tags, and more using
information stored in a list, database, or
spreadsheet.






































































70

The City School 2020-2021


Let’s Review


1. The header appears in the top margin, while the footer appears in the bottom margin.

2. Hyperlinks provide access to websites and email addresses directly from your document.
3. A page border is a border that appears outside the margins on each page.

4. Kerning is the amount of space between each character that you type.
5. Cropping may be helpful when a picture has a lot of content and you want to focus on

only part of it.
6. Tables are useful for various tasks such as presenting text information and numerical

data.
7. Microsoft Word uses wavy red underlines to indicate spelling problems and wavy green

underlines to indicate possible grammatical problems.
8. The Find feature allows to search the document whereas the Replace feature allows you

to quickly change words or phrases.
9. Read Mode is optimized for reading a document on the computer screen.

10. Print Layout is the default layout and the one you see most often.
11. Web Layout is suitable if you are designing a web page in Word. Web Layout view shows

how your document will look like a web page.
12. Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes,

name tags, and more using information stored in a list, database, or spreadsheet.





My Notes







































71

Stay Online...Stay Safe











Stay safe.... Do not give out your S
personal information







M Do not communicate with strangers



you meet online










Do not accept messages and friend A

requests from people who are strangers






R Check the authenticity of any news or




person from reliable sources











Tell your parents or teachers if someone T
or something makes you uncomfortable

E-Safety and Going Online


























Student Learning Outcomes



After going through this chapter, students will be able to:


1. Understand the function of the web browsers, URL and address bar
2. Use the bookmark feature to save the websites

3. Use and navigate through the browser history
4. Use the web to search information and refine the search process through the use of

special keywords.

5. Understand the function of internet protocols
6. Understand the privacy protection and intellectual property rules

7. Understand the hazards of the internet and ways to safeguard from the internet
threats.

8. Understand the concept of digital privacy, digital citizenship, digital citizenship, neti-

quette and cyber bullying
9. Familiarize with online Microsoft Office 365




ISTE Student Standard Coverage





Empowered Digital Knowledge Creative Global
Learner Citizen Constructor Communicator Collaborator
1a 2a 2b 3a 3b 3d 6d 7a 7b

The City School 2021-2022



3.1. What is a Web Browser


A web browser is a type of software that allows you to

find and view websites on the Internet. There are many

different web browsers, but some of the most common
ones include Google Chrome, Internet Explorer, Safari,
Microsoft Edge, and Mozilla Firefox.















Microsoft edge Safari Mozilla firefox Chrome Internet explorer



3.2. Web Browser Anatomy


There are certain elements that are common in almost all the browsers. These are

explained below:

URLs and Address Bar



Each website has a unique address, called a URL (short for Uniform Resource
Locator). It’s like a street address that tells your browser where to go on the Internet.

When you type a URL into the browser’s address bar and press Enter on your
keyboard, the browser will load the page associated with that URL. In the example

below, we have typed www.bbc.com/travel into the address bar.































74

The City School 2021-2022



Links

Whenever you see a word or phrase on a website that’s blue or underlined in blue, it’s

probably a hyperlink or link for short. You might already know how links work, even if
you have never thought about them much before. Links are used to navigate the Web.

When you click a link, it will usually take you to a different web page. You may also
notice that your cursor changes into a hand icon whenever you hover over a link. e-Safety and Going Online


Navigation Buttons

The Back and Forward buttons allow you to move through websites you have recently

viewed. You can also click and hold either button to see your recent history. The
Refresh button will reload the current page. If a website stops working, try using the

Refresh button.

















3.3. Bookmarks and Browser History


If you find a website you want to view later, it can be hard to

memorize the exact web address. Bookmarks, also known
as Favourites, are a great way to save and organize specific

websites so you can revisit them again and again. Simply
locate and select the Star icon to bookmark the current

website.




























75

The City School 2021-2022




Your browser will also keep a history of every site you visit.
This is another good way to find a site you visited previously.

To view your history, open your browser settings—usually by
clicking the icon in the upper-right corner—and select History.




























3.4. Search Engine


With billions of websites online today, there is a lot of

information on the Internet. Search engines
make this information easier to find. A search engine

is a web-based tool that enables users to locate
information on the World Wide Web. Search engines

use programs, often referred to as spiders,
robots or crawlers, to search the internet. These

programs are used by search engines to build an
index of the internet.






Searching the Web



There are many different search engines you can use, but some of the most popular
include Google, Yahoo!, and Bing.















76

The City School 2021-2022






1. To perform a search, you will need to navigate to a search engine in your web
browser, type one or more keywords— also known as search terms—then press

Enter on your keyboard. In this example, we will search for recipes. e-Safety and Going Online























2. After you run a search, you’ll see a list of relevant websites that match your search
terms. These are commonly known as search results. If you see a site that looks

interesting, you can click a link to open it. If the site doesn’t have what you need,
you can simply return to the results page to look for more options.




















































77

The City School 2021-2022




3. Alternatively, you can perform a web search directly from your address bar,

although some have a separate search bar next to the address bar. Simply type
your search terms and press. Enter to run the search.
























Refining the Search


If you are still having trouble finding exactly
what you need, you can use some special Checkpoint

characters to help refine your search. For
example, if you want to exclude a word A web browser is a type of software that

from a search, you can type a hyphen (-) at allows to find and view websites on the
internet.
the beginning of a word. So, if you wanted Bookmarks, also known as Favourites,

to find cookie recipes that don’t include provide a way to save and organize
specific websites so you can revisit them
chocolate, you could search for recipes again and again

cookies -chocolate. You can also search
for exact words or phrases to narrow down your results even more. All you need to

do is place quotation marks (“ “) around the desired search terms. For example, if
you search for recipes “sugar cookies”, your search results will only include recipes for

sugar cookies, instead of any cookies that happen to use sugar as an ingredient.
These techniques may come in handy in certain cases, but you probably won’t need

to use them with most searches. Search engines can usually figure out what you are
looking for without these extra characters. We recommend trying a few different

search suggestions before using this method.
















78

The City School 2021-2022




Content-Specific Search



There may be times when you are looking for something more specific, like a news
article, picture, or video. Most search engines have links at the top of the page that

allow you to perform these unique searches. e-Safety and Going Online
























You can use the extra search tools to narrow down your results even more. These tools

will change based on the type of content you are looking for, but in this example, we
can filter our images by size, colour, image type, and more. So, if you wanted to find

cookies with pink frosting, you could search for images that are mostly pink.















































79

The City School 2021-2022




3.5. Internet Protocols



In the field of telecommunications, a protocol is the set of standard rules for data
representation, signaling, authentication and error detection required to send

information over a communications channel. When computers connect and transmit
data between each other on the Internet, they follow a set of rules to do so. These

rules are universal; all computers throughout the Internet must follow them. Otherwise,
the Internet would not function as computers would not be able to transmit data

in a meaningful and useful way. These rules are called protocols. The Internet Protocol
(IP) family contains a set of related (and among the most widely used) network

protocols. Beside Internet Protocol itself, higher-level protocols like TCP, HTTP, SMTP,
POP3 and FTP all integrate with IP to provide additional capabilities.





TCP


The Transmission Control Protocol (TCP) is one of the

main protocols of the Internet
Protocol Suite. TCP is part of the popular TCP/IP”

combination used by the Internet. TCP/IP
The Internet Protocol, or IP, makes sure data on the

internet gets to the right place. Then TCP makes sure the
data is put in the right order, and none of it is missing. TCP

also helps to control traffic on the internet so it does not
get overloaded.

































80

The City School 2021-2022



HTTP


Hypertext Transfer Protocol (often abbreviated to

HTTP) is a communications protocol. It is used to send

and receive web pages and files on the internet. HTTP
works by using a user agent to connect to a server. e-Safety and Going Online
The user agent could be a web browser or spider. The http://

server must be located using a URL or URI. This always

contains http:// at the start. It normally connects to
port 80 on a computer.




FTP


FTP, also known as File Transfer Protocol, is a
protocol for the rapid, simple transmission of

files across a network supporting the TCP/IP FTP
protocol. This network is generally the Internet,

or a local network. FTP is a way of accessing
files on another computer. FTP uses the Client-

Server architecture, meaning that there is
a server, that holds the files, and does the

authentication, and a client, or the end-user,
who is accessing the files.



The server listens on the network for connection requests from other computers.
The client can make a connection to the FTP server by using FTP client software.

Once connected and authenticated (via rsh or SFTP) the client can do things such as
uploading files to the server, downloading files (taking the server’s files and putting

them on his own computer) from the server, and renaming, deleting files on the server,
changing file permissions, etc.





















81

The City School 2021-2022




SMTP



Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (e-mail) transmission

across Internet Protocol (IP) networks. SMTP is specified
for outgoing mail transport and uses TCP port 25.
SMTP




POP3



In computing, the Post Office Protocol
server
(POP) is an Internet standard protocol

used by local e-mail clients to retrieve
e-mail from a remote server over an
client
Internet connection. POP and Internet
Message Access Protocol or IMAP are

the two most prevalent Internet standard
protocols for e-mail retrieval. Virtually

all modern e-mail clients and servers
client
support both.



The POP3 protocol has been developed through several versions, with version 3 (POP3)
being the current standard. It uses TCP port 110.



3.6. Wiki


A wiki is a database of pages which people can edit/modify

while connected on the Internet. The building blocks of wikis
are the comments from visitors. It is website or database W

developed collaboratively by a community of users, allowing
any user to add and edit content.

One can generally edit a page in real time, search the wiki’s
content, and view updates since the last visit. Each wiki has














82

The City School 2021-2022



a specific purpose and a bunch of wiki pages that are maintained by the users of

that Wiki. Wikis can be used for a variety of purposes like documentation, knowledge
management or just a team repository of information.

Additional features can include calendar sharing, live Audio and video conferencing
and more.

Access this website to check the list of wiki websites: https://en.wikipedia.org/wiki/ e-Safety and Going Online
List_of_wikis A blog site, by contrast, does allow visitors to add content, but does not

usually allow them to change or edit previous comments from others.




3.7. Intellectual Property



Intellectual property (or IP for short) refers to creations
of the human mind (also known as the “intellect”) that

are a non-physical (or intangible) form of property.
Just like physical (or tangible) property, intellectual

property is something that people can own. Intellectual
property is the original expression of an idea that later

becomes something tangible.

It is important to cite sources you used in your research for several reasons:



• To show your reader you have done proper research by listing sources you used to
get your information.
• To be a responsible scholar by giving credit to other researchers and

acknowledging their ideas.

• To avoid plagiarism by quoting words and ideas used by other authors.
• To allow your reader to track down the sources you used by citing them accurately
in your paper by way of footnotes, a bibliography or reference list.


























83

The City School 2021-2022




3.8. Internet Hazards



Computer Virus


The term Computer Virus was first used in 1984 by
Fred Cohen. Cohen was the first to

suggest that one computer program could infect

another one. He later noted that a virus could
spread through a computer system or network to
infect other computers.


How Viruses Spread


Viruses are spread in a number of ways:










Downloads from the Use of pirated Through exchange of email attachements macro-viruses hidden
internet. software diskettes and emails in documents.




3.9. Types of Computer Viruses


Trojan


A Trojan is not a computer virus in the sense that it doesn’t get into the computer and
self replicate. A Trojan is software that appears to function in a certain way (such as

a program that user may have downloaded to remove viruses or spyware), when in
reality it performs another action, unknown to the user. A Trojan is not always harmful

and damaging to the computer, but it can open a back-door for hackers to get into the
computer and cause damage.























84

The City School 2021-2022



Worms


Computer Worms are like a virus in the fact that they do self-replicate themselves
within the computer system. However, a computer worm does not have to attach itself

to a program in the system like a computer virus does in order to function. Also, unlike

a computer virus that generally corrupts and modifies files on the computer to cause
damage, a computer worm generally localizes its damage to the computer network by e-Safety and Going Online
causing increased activity from the affected computer.


Spyware



Spyware is a newer type of program that damages the computer system. Spyware
is also not a computer virus in the traditional sense, but it is harmful. Spyware is used

to take some control over the computer user’s interactions with their computer. This is
all done with out the consent of the owner of the computer. Spyware does more than

monitor the computer user’s behavior; it can even collect a lot of personal information.
Spyware can change computer settings, install additional software, redirect web

browser activity, access websites that will permit dangerous viruses to get onto the
computer, and slow connection speeds.



Malware


Malware, short for malicious software, is a

kind of software that can be installed on a
computer without approval from the Checkpoint

computer’s owner. There are different kinds of
Internet protocol refer to the set of rules
malware that can hurt computers, such as followed by the computers when they
connect and transmit data between each
viruses and spyware. These programs can other.
steal passwords, delete files, collect personal Intellectual property refers to creations of
the human mind that are a non-physical
information, or even stop a computer from (or intangible) form of property.
working at all. Computer security or anti-

malware software is usually good at stopping malware from installing itself. When
security software isn’t installed, malware can get into the computer. Getting rid of

malware can be difficult, even when using programs designed to remove it.













85

The City School 2021-2022




Ransomware


Ransomware is a type of malware. It restricts access to the computer system that it
infects, and demands a ransom be paid to the creator(s) of the malware. This is in

order for the restriction to be removed. Some forms of ransomware encrypt files on
the system’s hard disk. Others may simply lock the system and display messages

intended to persuade the user to pay.


Phishing


Phishing is a way that criminals get sensitive information (like usernames or

passwords). It is a method of social engineering. Very often, phishing is done by
electronic mail. This mail appears to come from a bank or other service provider. It
usually says that because of some change in the system, the users need to re-enter

their usernames/passwords to confirm them. The emails usually have a link to a page

that looks almost like that of the real bank. Phishing allows criminals to get access to
bank accounts, or other accounts like shopping, auction or gaming accounts. It can
also be used for identity theft.



Adware

Adware, also sometimes known as advertising-supported software, is any type of

software packages that will automatically display, play, or download advertisements

to a computer after the software is installed on the computer or during the time the
application is being used.


3.10. Digital Citizenship



If you are a citizen, this means you belong to a
group of people. You could be a citizen of your

classroom or your neighbourhood. Being a Consumers reported losing more than
digital citizen means you are a part of the group $3.3 billion to fraud in 2020, Nearly $1.2
billion of losses reported last year were
of people that use technology to communicate. due to imposter scams, while online
shopping accounted for about $246
There are rules that you need to follow when million in reported losses from
consumers.
you are a digital citizen, to protect yourself and
to protect others.










86

The City School 2021-2022



3.11. Digital Resilience



A digitally resilient person will be able to:











Understand when Know what to do to Learn from their Recover when things e-Safety and Going Online
they are at risk online. seek help. experiences. go wrong.




3.12. Online Risks and Threats



People use the internet in all kind of ways. Just like offline, not everyone in the world
will say, or do kind things. Some people can be unkind on purpose, just because they

are hiding behind a screen.
There are many threats associated with use of Internet and one should know to

safeguard themselves from these threats.


Cyber Bullying


Cyber bullying is bullying that occurs online, often

through instant messaging, text messages, emails,

and social networks. If someone is repeatedly unkind
or harasses another person online, then they are a
cyberbully. Cyberbullying usually involves people you

know. It is often accompanied by traditional, offline,

bullying.



Examples of Cyber Bullying









Writing hurtful things through Posting derogatory messages Posting or sharing Creating a fake profile of
instant messagingm, text on social media to humiliate a embarrasing videos or photos someone to humiliate or hurt
messaging or online games. person or communiity over the social media. them.









87

The City School 2021-2022



How to Avoid Cyber Bullying












Do not reply to the Block all the messages from Keep all the e-mails and Report the bullying to the
messages sent by bully. the bully. messages that the bully sends. parent or a trusted adult.




Netiquette


If you merge the words internet and etiquette

together you get the word netiquette. This refers
to how to behave online. Following the rules of

netiquette involves exploring the digital world in a Nettiquette
way that is positive for both yourself and others you

may encounter along the way.
Here are some simple rules of netiquette that can

help make your experience online safer and more
enjoyable.



• Check before sharing images or videos of your friends or other people. They
may find them embarrassing or simply not want them to be made public. It is also

important to bear in mind that photos and videos of other people is their personal
data, so you should get permission before sharing.

• Think before you post anything. Is it going to upset, embarrass or offend anyone?
This includes writing nasty comments on a celebrity’s social media post. Trolling

people that you don’t know is still unkind!
• Check if information is true and reliable to the best of your knowledge before

accidentally spreading what could be misleading information.
• Think carefully about how you may come across in emails, messages or

comments. For example, writing in capital letters to your teacher may come across
as rude or even aggressive, even if you don’t intend it to















88

The City School 2021-2022



3.13. Internet Safety Tips



• Don’t give anyone your password, name, address, the name of your school or any
• information about your family.

• Don’t talk to strangers on the Internet.
• Don’t agree to meet anyone in person that you’ve met online. e-Safety and Going Online

• Don’t fill in a profile that asks for your name and address.
• Don’t visit a chat room without an adult’s / parent’s permission.

• Don’t stay online if you see something you think your parents won’t like.
• Don’t post pictures of yourself without your parents’ permission.

• Do not download or install anything on your computer without your parents’
permission.

• If you have any questions about something you read, ask your parent or guardian.
• If you are talking to someone online and they make you uncomfortable, remember

you don’t have to talk back to them.
• If someone you don’t know tries to add you as a friend online, or sends messages,

be wary that the name and photo they are using may not really be their real one.


3.14. Getting Familiar with Microsoft Office 365



Office 365 is a fully-featured web-based version of

Microsoft Office. It comes with the new Microsoft 365
subscription which includes Windows 10, MS Teams and Office 365

Office 365.



Why to Use Office 365

Checkpoint
Office 365 is a fully-featured web-based version of
Malware, or malicious software, is a kind
Microsoft Office. It comes with the new Microsoft 365 of software that can be installed on a
computer without approval from the
subscription which includes Windows 10, MS Teams computer’s owner.
Netiquette to how to behave online.
and Office 365. Phishing is a way that criminals get
sensitive information.

















89

The City School 2021-2022







Getting Started with Office 365


1. Open your web browser and navigate to portal.office.com. and login to your

Microsoft account by using your provided CSN email address and password.
































2. After signing-in, you will be redirected to a page where you can see all the office

365 apps. From here you should have access to your e-mail with Outlook, your
online storage with OneDrive, your Learning Management System with Microsoft

Teams, and your Office apps with Word, Excel, PowerPoint, and Access. You can
also access your contacts with People.





































90

The City School 2021-2022





Create New Files


1. Click the Start New icon, then select the icon for the type of file you want to
create from the pop-up window—Word document, Excel workbook, PowerPoint

presentation, Forms survey, Forms quiz, or Sway page. e-Safety and Going Online


































2. Alternatively, click the icon for the program you wish to use. Click the All Apps icon

to see additional apps. As an example, we will use Word, but you can choose any
of the Office apps. The online versions of Excel, PowerPoint, and OneNote work

similarly to Word in that they offer all the basic commands and features.





































91

The City School 2021-2022




3. Click the icon for Word to launch the new document page, where you can select a

template or create a blank document.




















4. In this example, we will start with blank template.

























5. By default, your document is saved in the root location of your OneDrive storage

space. If you plan to work with a lot of different documents, you may want to
create specific folders in OneDrive to store these files. If you want to save a copy of
your document in a specific folder, click File > Save As > Save a copy to OneDrive
































92

The City School 2021-2022





6. Navigate your OneDrive space and select the folder to which you want to save
your document, then click Save. Afterwards, your document automatically saves

periodically so you don’t have to manually keep saving it as you do with the

desktop version of Word. e-Safety and Going Online




































7. Alternatively, you can also click on Download a Copy to save a copy of the file as
is to your desktop if you want to edit it offline. You can also download the file as a

PDF.







































93

The City School 2021-2022





Open an Existing File


Instead of starting a new document, you can open an existing file a few different ways.

If you’re already in the app for that file, click the File menu and you’ll see a list of recent
documents. Click the one you want to open.

















































































94

The City School 2021-2022




Let’s Review


1. URL stands for Uniform Resource locator.

2. A search engine is a web-based tool that enables users to locate information on
the World Wide Web.

3. TCP makes sure the data is put in the right order, and none of it is missing.
4. Hypertext Transfer Protocol (HTTP) is used to send and receive web pages and

files on the internet.
5. File Transfer Protocol (FTP) allows the rapid, simple transmission of files across a

network supporting the TCP/IP protocol.
6. Simple Mail Transfer Protocol (SMTP) is an Internet standard for (e-mail)

transmission across IP networks.
7. Post Office Protocol (POP) used by local e-mail clients to retrieve e-mail from a

remote server over an Internet connection.
8. A wiki is a database of pages which people can edit/modify while connected on

the Internet.
9. Computer Worms self-replicate themselves within the computer system.

10. Spyware can even collect a lot of personal information.
11. Ransomeware restricts access to the computer system that it infects, and

demands a ransom be paid to the creator(s) of the malware.
12. Office 365 is a fully-featured web-based version of Microsoft Office.





My Notes!



































95

Important Design Tips







Simple




Do not overwhelm your design with text

and images




Colors



Make use of cohesive color palette

in your design.







Visual Hierarchy



Ensure that important elements in your

design stand out.




Typography




Avoid using too many font styles in your

design.



Dimensions



It is important to the dimensions of

your design.

Modular Designing

























Student Learning Outcomes




After going through this chapter, students will be able to:

1. Familiarize with Edraw Max’s user interface

2. Use available templates to create designs and plans

3. Work with shapes, objects, connector lines and arcs.
4. Manipulate color, resize and change objects and connector lines

5. Insert text on the design

6. Work with themes, styles and effects to make the design aesthetically appealing.
7. Ensure consistency in their design work by using rulers and grid lines.

8. Save and print the design work.

ISTE Student Standard Coverage






Empowered Innovative Creative
Learner Designer Communicator

1a 1d 4a 4c 4d 6c 6d

The City School 2021-2022




4.1. Getting Started with EDraw Max



EDraw Max is an extremely powerful all-in-one diagramming
tool that can serve all of your purposes. Whether you need to

draw flowcharts, fishbone diagrams, UML diagrams or design
floor plans, office layouts, you can find what you want in

EDraw Max.


4.2. EDraw Max Interface



EDraw user interface is similar to Microsoft Program interface, which can minimize the
learning curve. EDraw user interface includes 7 major menus: File, Home, Insert, Page

Layout, View, Symbols and Help. These menus are introduced in detail with illustrations
below. A menu’s background turns white after selected. Clicking another menu turns

off the menu selected before.

Home


The Home tab has following options:


1. Quick Access Toolbar: commands here are always visible. Right click a ribbon

command to add it here.











































98

The City School 2021-2022




2. Libraries: gives access to a wide-range of assets. You can search different shapes
for your design through the Search feature in the library section.
Modular Designing

























3. Page layout: allows to change page layout, change the page setup, theme and
background.




















4. Style: apply quick style and change fill, line style and change effect.




































99

The City School 2021-2022




5. Drawing area: apply quick style and change fill, line style and change effect.








































6. Footer: consist of drawing area (the white area), page label, color bar (to change

colours), zoom bar (to zoom in and out).














































100


Click to View FlipBook Version