Page 132 - Viva ICSE Computer Studies 6 : E-book
P. 132

LEARNING IS FUN





                     A     Collage Fun


                           Make a collage on chart paper about the potential threats in the Internet world and display it in
                           your classroom. Also write the advantages and disadvantages of using Internet.


                                                                                 O   M   E   P   Y    K   S   Q   Q   S
                     B     Word Search Puzzle                                     I   I  D    I   L   C   F   B   Y   I

                           Draw the components of an e-mail window in your       D   N   C   H    I  D    A   E   Q   G
                           scrapbook and mark them. Also describe them in a      A   T   S   O   A    I   C   A   Q   N
                           few lines.                                            R   E   A   G   M    F   E   F   F   A

                           Find the words related to this chapter in the given   B   R   C   Y    E   P   B   I  M    T
                           word search grid.                                     E   N   W   H    S   S  O    Y   N   U
                                                                                 W   E   Z    J  P   Q   O    S  M    R
                     C     Crossword Puzzle                                      N   T   G   C   V    T   K   J   E   E

                           Use the given hints to complete the crossword.        V   S   M   O   O    R   T   A   H   C
                             1. 
                                                                           Across
                                                                           2.  Sends its fi le through cables that connect
                                                             3.               many computers and are similar to viruses
                    2.                                                        but less eff ective and easy to remove
                                                4.                 5.    6.  Software installed in a computer without
                                                                               the user’s knowledge and designed to
                                                                               collect information from the device
                                                                           7.  Programs designed with intentions of
                        6. 
                                                                               stealing or altering data from a computer
                                                                           8.  Software that tricks the user to purchase
                                                                               and download software that are harmful
                    7.                                                        for the computer
                                           8. 






                    Down
                    1.  Viruses that trick the user by acting as an original fi le
                    3.  Software once installed on a system, records every keystroke made on the system

                    4.  Created by the programmer to harm memory, processing speed and essential data
                    5.  Malware that locks the data on the user’s computer and demands payment to unlock the data



                    120
   127   128   129   130   131   132   133   134   135   136   137