Search Header Logo
Computing End of year Revision

Computing End of year Revision

Assessment

Presentation

•

Computers

•

7th - 8th Grade

•

Medium

Created by

Hannah Reynolds

Used 2+ times

FREE Resource

29 Slides • 11 Questions

1

Computing End of year Revision

Some helpful topics and tips for your end of year exams

Slide image

2

Topics you need to revise

  • Online safety - Viruses, passwords and digital footprints

  • Scratch

  • Flowcharts

  • Computational thinking

3

Online Safety

The key points

4

Passwords

Your password shouldn't be obvious - if its obvious anyone can guess it!

Make sure you make it as complicated as you can but make sure you can remember it!

maybe use a mixture of numbers, letters, symbols and use upper and lower case.

5

Poll

Which password would you choose as the strongest?

ilovemydog

Il0vEmyD0g!

ilovemydog!

6

Hopefully you chose option 2!

  • it had a mixture of upper and lower

  • it used the number zero instead of o's

  • It used an exclamation point!

7

Multiple Choice

Should you share your password?

1

If its with someone you really trust, sure

2

only with your parents

3

no, it should only be known by me

8

So what are viruses?

like a cold right?

9

Fill in the Blank

A virus is a piece of ....... that can copy itself and damage your computer

10

There are different types of computer virus

  • a trojan

  • viruses

  • worms

  • spyware

11

Multiple Choice

A trojan Horse Virus is what?

1

a type of malware that conceals its true content to fool a user into thinking it's a harmless file

2

a malicious piece of computer code designed to spread from device to device.

3

a type of malware that spreads copies of itself from computer to computer, which can replicate itself without any human interaction

4

malicious software designed to enter your computer device, gather data about you, and forward it to someone else

12

Multiple Choice

A virus is....

1

a malicious piece of computer code designed to spread from device to device.

2

a type of malware that spreads copies of itself from computer to computer,

which can replicate itself without any human interaction

3

malicious software designed to enter your computer device, gather data about you, and forward it to someone else

4

a type of malware that conceals its true content to fool a user into thinking it's a harmless file

13

Multiple Choice

A worm is....

1

a type of malware that conceals its true content to fool a user into thinking it's a harmless file

2

malicious software designed to enter your computer device, gather data about you, and forward it to someone else

3

a type of malware that spreads copies of itself from computer to computer,

which can replicate itself without any human interaction

4

a malicious piece of computer code designed to spread from device to device.

14

Multiple Choice

Spyware is what?

1

a type of malware that conceals its true content to fool a user into thinking it's a harmless file

2

malicious software designed to enter your computer device, gather data about you, and forward it to someone else

3

a type of malware that spreads copies of itself from computer to computer,

which can replicate itself without any human interaction

4

a malicious piece of computer code designed to spread from device to device.

15

Computer viruses and malware can have some serious effects on your computer

  • If can make your computer slow, unresponsive and crash

  • They can allow someone else to access your files or personal information

  • You could lose your data or files

16

S how do you get computer viruses on your devices?

  • You could download them from a website

  • you could open an email from someone you dont know

  • it could be on a USB drive or storage device

17

What is a digital footprint?

  • Every time you go online you leave a trace

  • it shows where you've been, what you've searched for and every post you've made

  • But why is this important?

18

Your digital footprint is important because...

Every time you go for an interview, for a job, for uni they can access your digital footprint and see your past posts!

If you have been mean, derogative or abusive online (ever) they can see this and they may not hire you/accept you!

Thieves can use your digial footprint to access your online accounts and spend your money without you knowing.

Companies use your digital footprint to sell your personal information!

19

Multiple Choice

What you delete something online its gone forever, right?

1

No! when you post something online its permanent

2

Yes! Of course, you deleted it silly!

20

There are somethings you can do to protect yourself and reduce your digital footprint!

  • Log out of websites when you leave them

  • Increase your privacy settings on social media

  • regularly delete your browser cookies

21

web page not embeddable
InterlandPage 1right hand side copyright hand side copyPage 1right hand side copyllllllllllllllllllllllllllllllllAsset 17llllllllll

InterlandPage 1right hand side copyright hand side copyPage 1right hand side copyllllllllllllllllllllllllllllllllAsset 17llllllllll

You can open this webpage in a new tab.

22

Scratch!

Slide image

23

In this section you need to know about how scratch works!

  • you'll need to know about code blocks, controls and functions!

24

Loops!

  • These are loops or iterations!

  • These will make actions repeat for as long as stated

Slide image

25

Events

These are the controls that are used to make the code work properly. They tell the code when to start and what to do when specific keys are pressed!

Slide image

26

Motions!

  • These are the motion controls they make your sprite move!

  • Some of them allow you to enter in where you want your sprite to move to on a grid and some tell the sprite how much to move

Slide image

27

This code block allows someone to enter 2 numbers which the code then multiples!

Slide image

28

Flowcharts!

29

What is a flowchart?

Slide image

30

Multiple Choice

A flowchart is...

1

a picture

2

a chart to follow

3

an algorithm written down

4

a visual representation of an algorithm

31

There are different symbols you will need to know!

  • You will need to know about the terminator, the decision box, the flow lines, the process box and input/output box.

32

Slide image

33

Fill in the Blank

A flow chart should flow from....

34

And finally Computational Thinking!

35

Multiple Select

There are how many parts to computational thinking?

1

6

2

2

3

5

4

4

36

There are 4 parts to computational thinking

  • Decomposition

  • Abstraction

  • Pattern recognition

  • Algorithm

37

Decomposition

  • Decomposition is breaking down complex problems into smaller more manageable tasks




Slide image

38

Pattern Recognition

Pattern recognition is finding similarities in the code

Slide image

39

Abstraction

Abstraction is removing unimportant information

Slide image

40

Algorithm

an Algorithm is a list of step by step instructions.

Slide image

Computing End of year Revision

Some helpful topics and tips for your end of year exams

Slide image

Show answer

Auto Play

Slide 1 / 40

SLIDE