0% found this document useful (0 votes)
20 views3 pages

Model Notes Grade 7 - CH 2

Computing Notes for Grade 7 Cambridge chapter 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

Model Notes Grade 7 - CH 2

Computing Notes for Grade 7 Cambridge chapter 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MODEL NOTES

Digital Literacy: Staying Safe Online


2.1 Collecting Data Online
A. Keywords:
i. E- Commerce: Online Shopping
ii. Encrypt: Coded data to protect it.
iii. Cookies: Small file stored in computer when we visit a website.
B. Short Notes:
i. Registration: Online registration means becoming member of a website. We fill
in an online form and provide information about ourself to the owner website.
ii. Cookies: A small file that is stored in our computer when we visit a website. It
saves the information about the way of ours using the website and improves user
experience.
iii. Types of cookies:
There are four types of cookies:
• Essential Cookies: It is needed to make a website function as it is designed.
• Professional Cookies: It collects information about how we use a website
and the performance of the website is improved by the owner using this
information.
• Functionality Cookies: It records everything what we do in a website.
• Advertising Cookies: It records what we look in online and it is used to
personalise the adverts displayed on the web page.
2.2 Danger Online
A. Keywords:
i. Cybercrime: Risk that we face while being online.
ii. Cybercriminals: Uses internet to commit crimes.
B. Short Notes:
i. Different Methods of Cybercrimes:
• Identity theft
• Phishing
• Scamming
• Hacking
ii. Malware: It is a software that a criminal installs on a computer. They may steal
information or damage files or stop computer from working properly.
iii. Different types of Malwares are:
• Virus: VIRUS stands for vital information and resources under siege. It
spreads and infects the files that it meets. Some virus can be harmless and
other can be dangerous to destroy data.
• Trojan: They are hidden inside another program like games. When
someone uses the program, the malware is released and starts to work.
They are popular among cybercriminal as they are easy to write and
spread.
• Ransomware: It encrypts all data in a computer and that data cannot be
used. The victim of a ransomware receives a message demanding a
payment to remove the encryption.
• Spyware: Sits on computer and record what the user is typing. Criminals
use spyware to discover login details.
• Adware: It places unwanted adverts on victim computer. They are
displayed on web page such as social media or internet shopping.
2.3 Protect your computer
A. Keywords:
i. AV Software: Anti-Virus software prevents damage to our computer.
ii. Signature of Malware: The fingerprint is piece of programming code that is
unique to malware. This fingerprint is called a Signature. AV Software contains
a database of malware signature.
iii. Firewall: It protects the computer by not allowing the data coming from unknown
source.
2.4 Cyberbullying
A. Keywords:
i. Cyberbully: A person who uses the internet to bully people.
B. Short Notes:
i. Methods of cyberbullies are:
• Harassment: A bully sends threatening messages by text message or
instant messaging. The messages make physical threats and can be
frightening. This is serious form of bullying.
• Impersonation: Impersonation is a crime that involves taking on another
person's identity without their knowledge or consent, for the purpose of
gaining an advantage or causing harm.
• Exclusion: Exclusion is the act of intentionally singling out and leaving a
person out from an online group such as chats and sites. The group then
subsequently leave malicious comments and harass the one they singled
out.
• Dissing: Dissing refers to the act of a bully spreading cruel information
about their target through public posts or private messages to either ruin
their reputation or relationships with other people.
• Photographs: Some cyberbully takes the image of their target and uses it
against them in social media or via text messages for harassment.
ii. The effects of cyberbullying:
• Confidence: Bully will affect the self-confidence.
• Change of personality: Being bullied can change someone’s behaviour.
• Loneliness: A person who is often bullied feels that no one can help them.
• Performance at school: A bullied student’s performance will be
decreasing.
2.5 Use content responsibly
A. Keywords:
i. Intellectual Property: Something that has been created by an individual.
ii. Copyright: ©
iii. Trade Mark: TM
iv.

Patent:
v.
Registered design:
B. Short Notes:
i. Copyright: It means we have the right to copy our work but other people must
ask permission before they can use it.
ii. Trade Mark: Companies use trademark to protect logos, slogans and product
names.
iii. Patent: Inventors use patents to protect their new inventions.
iv. Registered Design: This is used to protect designs like wallpaper and carpet
patterns.
v. Creative Commons: Creative commons let us use image without asking owners
permission and are available free of charge on the internet.
vi. Software Piracy: Copyright theft is a cybercrime. Criminals makes copies of
music, games and films. They sell this copies over the internet. This type of crime
is called piracy. When software is illegally copied or sold it is called software
piracy.

2.6 Giving Credit


A. Keywords:
i. Citation or attribution: The text that is used to give credit to the owner of the content
is called a citation or attribution.
ii. Plagiarism: Pretending someone else’s work as own work.
B. Short notes:
i. Information to be included in citation:
• author
• year
• title
• internet address

You might also like