Information Communication Technology - ICT (2018)
Information Communication Technology - ICT (2018)
Communication
Technology
Teachers’ Guide
Grade 7
(Effective from 2018)
www.nie.lk
Information and Communication Technology
Grade 7 –Teacher’s Guide
ISBN:
www.nie.lk
Printed by
ii
CONTENTS Page No
Curriculum Committee v
Introduction vi
Syllabus 1-4
Teachers’ Guide 6 – 63
iii
Message from the Director General
With the primary objective of realizing the National Educational Goals recommended by the
National Education Commission, the then prevalent content based curriculum was modernized, and
the first phase of the new competency based curriculum was introduced to the eight year curriculum
cycle of the primary and secondary education in Sri Lanka in the year 2007
The second phase of the curriculum cycle thus initiated was introduced to the education system in the
year 2015 as a result of a curriculum rationalization process based on research findings and various
proposals made by stake holders.
Within this rationalization process the concepts of vertical and horizontal integration have been
employed in order to build up competencies of students, from foundation level to higher levels, and
to avoid repetition of subject content in various subjects respectively and furthermore, to develop a
curriculum that is implementable and student friendly.
The new Teachers’ Guides have been introduced with the aim of providing the teachers with the
necessary guidance for planning lessons, engaging students effectively in the learning teaching
process, and to make Teachers’ Guides that will help teachers to be more effective within the
classroom. Further, the present Teachers’ Guides have given the necessary freedom for the teachers
to select quality inputs and activities in order to improve student competencies. Since the Teachers’
Guides do not place greater emphasis on the subject content prescribed for the relevant grades, it is
very much necessary to use these guides along with the text books compiled by the Educational
Publications Department if, Guides are to be made more effective.
The primary objective of this rationalized new curriculum, the new Teachers’ Guides, and the new
prescribed texts is to transform the student population into a human resource replete with the skills
and competencies required for the world of work, through embarking upon a pattern of education
which is more student centered and activity based.
I wish to make use of this opportunity to thank and express my appreciation to the members of the
Council, and the Academic Affairs Board of the NIE the resource persons who contributed to the
compiling of these Teachers’ Guides and other parties for their dedication in this matter.
Director General
iv
Curriculum Committee
Guidance and Approval Academic Affairs Board
National Institute of Education
Dr. B. Riskhan (Ph.D, MEd, B.Sc., PGDE) Lecturer, Mahaweli National Collage of
Education, Polgolla
P.N.W.A.L.K.Premarathne(M.Sc., B.Sc.) Teacher, Girls High School, Kandy
M. Indrapalan(M.Sc) Teacher, Manipay Hindu College
N.D. Samarasinghe(PGD (IT), PGDE, B.Sc.) Centre manager, CRC, B/Ananda MMV,
Haldummulla
Y.D.V. Pathirana Retired Instructor
v
Introduction
Information and Communication Technology has been identified worldwide as a tool that can be used
to improve productivity, efficiency and effectiveness of organizational work and the daily activities
of individuals. Therefore, providing an adequate level of ICT knowledge and skills, at different levels
of education, is important for the students to progress and contribute towards national development.
The current Sri Lankan Secondary Education System has been substantially exposed to ICT through
various programs including CAL, ICT for GCE (O/L), GIT for grade 12 and ICT as a component for
the A/L Technology stream. Consequently, to maintain the progression in competencies, the need has
arisen now for implementation of learning the subject ICT from grade 6 to 9.
It has been the focus of the curriculum committee to make this balance of competencies in theory and
practice in order to lay a foundation for higher studies in ICT, to apply the competencies of day to
day practical situations, to improve ICT literacy and to expose them to international standards.
vi
National Goals
1. Based on the concept of respecting human values and understanding the differences in
any between the Sri Lankan multi-cultural society, building up the nation and confirming
the identity of Sri Lanka by promoting national integrity, national unity, national
coherence and peace
2. While responding to the challenges of the dynamic world, identifying and conserving the
National heritage.
4. Promoting a sustainable life style based on the people’s mental and physical well-being
and the concept of human values
5. Promoting the positive feelings needed for a balanced personality with the qualities of
creative skills, initiative, critical thinking and responsibility.
6. Through education, developing the human resources, needed for the progress of the well-
being of an individual, the nation as well as the economic growth of Sri Lanka.
7. Preparing people for the changes that occur in a rapidly changing world by adapting to it
and controlling them; developing the abilities and the potentialities of the people to face
complex and unexpected occasions.
8. Sustaining the skills and attitudes based on justice, equality, mutual respect which are
essential to achieve a respectable place in the international community.
vii
Basic Competencies
The competencies promoted through education mentioned below might help to achieve the above
mentioned National Goals.
1. Competencies in Communication
Numeracy: Using numbers to count, calculate, code and to measure, matter, space
and time
Graphics: Making sense of line and form, expressing and recording essential data,
instructions and ideas with line, form, color, two and three-dimensional
configurations, graphic symbols and icons
ICT Competencies:
Knowledge on computers, and the ability to use the information
communication skills learning in work as well as in private life
This is the second set of competencies related to the Social, Biological and Physical
Environments.
viii
Physical Environment: Awareness, sensitivity and skills relating to space, energy,
fuels, matter, materials and their links with human
living, food, clothing, shelter, health, comfort,
respiration, sleep, relaxation, rest, waste and excretion,
media of communication and transport. Included here
are the skills in using tools to shape and materials for
living and learning
Competencies that link up with pleasure, joy, emotions and such human
motivations. These find expression in play, sports, athletics and leisure
pursuit of many types. These also link up with such values as cooperation,
team work, healthy competition in life and work. Here are included such
activities as are involved in aesthetics, arts, drama, literature, exploratory
research and other creative modes in human living.
ix
Objectives of the Subject
x
Proposed number of periods for each unit
02
1.1, 1.2
05
2.1, 2.2,2.3, 2.4
1st Term
02
3.1, 3.2
01
4.1
08
5.1, 5.2, 5.3, 5.4
2nd Term
02
6.1
03
6.1
3rd Term
07
7.1, 7.2, 7.3, 7.4
Total 30
xi
Grade 7 Syllabus
Information and Communication Technology
1
3. Uses various 3.1 Uses various Surge protection and protection i. Identifies hardware security 01
Safety precautionary against voltage drops (Fuses and issues.
precautions in methods to protect UPS) ii. Takes precautions to
a computer physical components Protection against physical damage minimize risk to hardware
laboratory of a computer (dust, humidity, insects etc.) components
Protection against overheating
inside the computer
3.2 Uses various Use of Anti-virus and other i. Identifies software security 01
precautionary measures against malware. issues
methods to protect ii. Takes precautions to
Access Controls (physical locks
software components minimize damages to
of a computer. and passwords ) software
4. Uses text 4.1. Uses computers Use of proper techniques in typing i. Demonstrates skills in the 01
editing efficiently by (touch typing ) English keyboard
software to developing typing skills Use of typing practice software to ii. Demonstrates skills in the
type effectively develop typing skill Sinhala/Tamil keyboards
5. Uses 5.1 Analyzes simple Use of flow charts. i. Demonstrates critical and 02
programming problems by o Sequence analytical thinking
language to decomposing and o Selection (Concept of techniques
develop simple connecting them Selection) ii. Describes sequence in
programs logically o Iteration (Concept of Iteration) flowcharts
(Using iii. Demonstrates the use of
Scratch) . sequence in flowcharts
appropriately
5.2 Develops simple Introduction to Interactive i. Uses Scratch programming 03
programs using visual Development Environment – IDE
development Interface (IDE) to develop ii. Applies basic instructions
environment (Using computer programs sequentially to develop
Scratch) Developing simple simple programs
programs(sequence type) using
visual supports of programming
language (using an Interface)
2
Specially designed to teach
programming to children
5.3 Describe the concept Definition of variable i. Describes the use of 02
of variables in Use of variables in programs variables in a program
programs ii. Writes programs with
variables appropriately
5.4 Identifies the concept Introduction of an error to an error- i. Describes the effect of 01
of errors in a free programs and observation of errors in a program and
program as bugs the output takes precautions to avoid
errors
6. Uses 6.1Uses basic functions Create, open, save and close a i. Creates presentation using 05
Presentation of Presentation Presentation Presentation software
software to software in creating a Add Slide
create presentation. Inserting files/objects (text, picture,
presentation shapes, clip art, word art etc.)
Formatting of Text
Add Multimedia and charts to a
slide
Slide Designs
Move, duplicate, Hide and Delete
Slides
Slide transitions
7. Uses the 7.1 Uses resources WWW, URL i. Uses Internet for 01
services of the available in the Download images, audio, video etc. information gathering
Internet and Internet (text, Accessing earth maps ii. Identifies trusted and
develops web images, audios, Trusted and untrusted websites untrusted websites
pages videos etc.) Authentic and reliable information iii. Identifies authentic and
reliable information
7.2 Uses offline (E-mail) Web based free E-mail i. Communicates via e-mails 02
and online (Chat) Creation of accounts. ii. Communicates via online
Communication o Use of e-mail: Subject, To, Bcc, conferencing
Cc, Attachments, Forward,
3
Inbox, Outbox. Draft, Trash,
Spam, Reply
Online conferencing
7.3 Develops web pages Creation of a web page using text, i. Designs a simple website
using HTML images ii. Creates a simple website 02
o Text formatting
o Colors
o Lists
Creating links to the other pages &
web sites.
7.4 Uses the Internet Protection against unauthorized i. Uses the Internet safely 02
safely, securely and access and malware ii. Uses the Internet securely
ethically o Hacking iii. Uses the Internet ethically
o Virus attacks
o Software piracy
Protection in using the Internet
against crime
o Cyber bullying
o Stealing others data
Online safety precautions against
unknown parties (Email, social
media etc.)
Total 30
4
The Learning Teaching process
Information and Communication Technology is a rapidly changing subject and students are eager to
use the latest technology. Provide actual hands on experience for each student using practical
exercises. Allow them to convince theoretical basis through practical exercises.
It is essential that the proposed method of teaching should be student-centered as this subject is
essentially practice-oriented. There is the need for special attention to be paid to encourage the student
for self-study. Guide the student to apply the achieved ICT competencies to improve the learning
process of other subjects.
Primitive social values and legal constraints related to the subject carry with them the imperatives of
a sense and spirit of self-discipline. It is essential that the learning-teaching evaluation process is so
organized as to highlight the importance of computer use.
Students should be motivated and inspired to attend group activities to learn new things and do
collaborative activities to share and convey their findings with others through ICT and manual
mediums.
5
Competency 1 : Identifies the organization of the Computer
Time : 01 period
Learning Outcome:
Explains the functions of Arithmetic and Logical Unit (ALU) and Control Unit (CU)
Content:
CPU
ALU
CU
Identifies the CPU in the Computer System
Components of a CPU
Function of ALU and CU
Identifies different types of CPU
Guidance for lesson plans:
Divide the students in the class into four groups Identify the searched components in the
computer system and other available types in the laboratory
Discuss with students the components of CPU
Discuss the functions of CPU
Guidance for assessment and evaluation:
Identify the different types of operations
Identify the different devices which are controlled by the CPU
Quality inputs:
6
Reading Material
CPU
7
Competency 1 : Identifies the organization of the Computer
Time : 01 period
Learning Outcome:
Content:
Brief history of Processor Element (Vacuum Tube, Transistor, IC etc.) : Clock Speed,
Size, Generated Heat, Power Consumption, Cost etc.
Vacuum Tube
Transistor
IC
Clock Speed
Brief history of Processor Element (Vacuum Tube, Transistor, IC etc.): Clock Speed, Size,
Generated Heat, Power Consumption, Cost etc.
Quality inputs:
8
Reading Material
Evolution of Computers
9
Competency 2 : Explores the functions of the Operating System
Time : 01 period
Learning Outcome:
Contents:
Operating System
Windows
Linux
Android
Mac OS
Mobile OS
Explain Different type of operating systems
Identifies operating system for different devices
Take the students about the school, different administration buildings in the school and
explain the school administration system such as principal’s office, administration office and
which area can be used by the students and teachers and explain why there are some important
data that cannot be handled by every person. Similarly explain the role of the computer
operating system and its main concept.
Quality inputs:
10
Reading Material
Operating System
An operating system (OS) is a system software that manages the computer hardware and the
software resources and provides common services for computer programs and a convenient interface
for the computer users.
Fig. 2.1.1 – manages hardware and software resources from operating system
Windows
Linux
Android
Mac OS
Mobile OS
Functions of OS
11
Competency 2 : Explores the functions of the Operating system
Time : 01 period
Learning Outcomes:
Contents:
Hard drive, Flash Drive, CD, DVD
Storage
Storage Unit
Computer Storage
CD,DVD
Flash Drive
Hard Drive
12
Reading Material
Fig. 2.2.1
A storage device is any computing hardware that is used for storing, retrieving and extracting data
files and objects. It can hold and store information both temporarily and permanently, and can be
internal or external to a computer, server or any similar computing device.
Secondary storage
13
Competency 2 : Explores the functions of an Operating System
Competency Level 2.3 : Creates folders save/open/edit/ delete/ re-name/ copy/move/ files
Time : 02 periods
Learning Outcome:
Contents:
Manipulation of Folders and Files
o Copying and moving files from one storage unit to another
Storage devices
Drive
Folder and File
Manipulation of folder
o Create and name the folder
o Rename the folder
Manipulation of file
o Create a file
o Rename the file
o Save the file
o Open the file
o Modify the file
o Save as the file
Save the file in a defined path
Divide the students in to groups and guide them to follow the following steps
Provide a working computer for each pair.
Instruct them to follow these steps
o Create a new folder
o Create a file in the folder and save it
o Rename the file
o Edit the file
o Save the file
o Open an existing file
o Modify some text
o Save as under a different name/extension/location
o Copy the file and paste it in a specific place (folder)
o Move the file to a different place (folder)
Guide the students to copy the file and paste in another place (folder), move to another folder.
Student should be able to understand that protected files cannot opened by others without
permission.
14
Guidance for assessments and evaluations:
Divide the students pairs and ask each pair to do the following activities.
Quality inputs:
Computer
15
Reading Material
16
Competency 2 : Explores the functions of the Operating System
Time : 01 period
Learning Outcome:
Contents:
Files
Properties
o Name
o Type
o Size
o Modified date
Quality inputs:
Computer
Specific folder
17
Reading Material
Windows Explorer
Windows Explorer is the file management application in Windows. Windows Explorer can be used
to navigate your hard drive and display the contents of the folders and sub folders you use to organize
your files on your hard drive.
View the folders and files in many ways in Windows Explorer Window
Fig. 2.4.2 - folders and files in many ways in windows explorer window
18
Fig. 2.4.3 - folders and files in many ways in windows explorer window
Folder
In computers, a folder is the virtual location for applications, documents, data or other sub-folders.
Folders help in storing and organizing files and data in the computer.
File
A computer file is a computer resource for recording data discretely in a computer storage device.
Just as words can be written on paper, so can information be written on a computer file. There are
different types of computer files, designed for different purposes.
Fig. 2.4.4 - Folder Properties dialog box Fig. 2.4.5 - File Properties dialog box
19
File Type
This helps you to identify the type of the file, such as PDF document, Open Document Text, or JPEG
image. The file type determines which application in used to open the file. For example, you cannot
open a picture with a music player.
File Size
This field is displayed if you are looking at a file (not a folder). The size of a file tells you how much
disk space it takes up.
The created date is the date on which the file was originally created and the modified date is the date
on which the file was last modified.
20
Competency 3 : Uses various safety precautions in a computer laboratory
Competency Level 3.1: Uses various precautionary methods to protect the physical components
of a computer
Time : 01 period
Learning Outcome:
Contents:
Surge protection and protection against voltage drops (Fuses and UPS)
Protection against physical damage (dust, humidity, insects etc.)
Protection against overheating inside the computer
Voltage drop
Physical damage
Overheating
Identify the things that are in the computer laboratory
Identify what the electricity source is for the computer laboratory
Identify the physical damage for the parts of the computer
How to protect the computer laboratory from the physical damages
Divide the students into groups and ask them to observe the computer laboratory
Ask the groups to identify the electrical items in the computer laboratory
Ask the groups to identify the physical components that can be damaged.
Ask the groups to identify protection methods against physical damages
Discuss with groups protection against overheating inside the computer
Discuss with groups protection against physical damage
Quality inputs:
Reading Material
21
Electrical items in the computer laboratory
o Computers
o Computer peripherals
o Power cables
o Data cobles
o Network tools
o Multimedia projector/s
o Storage devices (CD,DVD)
The possibilities of physical damages to the items in the computer lab
o Computer parts with dust and moisture.
o Broken Power cables
o Computer and Peripherals placed at the edge of the table
o Using computers during thundering and lightning
o Using more than the recommended number of computers in a single plug point
Rules for Protecting Equipment
o Do not bring any food or drinks near the machine.
o Turn off the machine, when you are done it.
o Do not access external devices without scanning them for computer viruses.
o Ensure that the temperature in the room stays cool, since there are a lot of machines
inside a laboratory, and these can overheat easily. This is one of the many ways of
ensuring computer safety.
o Try not to touch any of the circuit boards and power sockets when something is
connected to them and switched on.
o Dust can affect computers adversely. Ensure that the machines are cleaned on a regular
basis.
o Disruption of power may lead to data loss/ corruption/ malfunction.
Using standby power sources, UPS is mainly used as a Power Backup for a few
minutes
Rules for Protecting Yourself
o Do not run inside the computer laboratory.
o Take a note of all the exits in the room, and also take note of the location of fire
extinguishers in the room (if available) for the sake of fire safety.
o Keep bags and other items in the designated area, as they can cause people to trip if
they are simply lying around the room.
o Try not to type continuously for extremely long periods.
o Look away from the screen once in a while to give your eyes a rest.
o Do not touch any exposed wires or sockets.
o Do not attempt to open any machines, and do not touch the backs of machines when
they are switched on.
o Do not spill water or any other liquid on the machine
22
Conform with the following before using the computer laboratory
o Check the main source and wall plug
o Check that computer is connected through the UPS
23
Competency 3 : Uses various Safety precautions in a computer laboratory
Competency Level 3.2 : Uses various precautionary methods to protect the software
components of a computer.
Time : 01 period
Learning Outcome:
Contents:
Use of Anti-virus and other measures against malware.
Access Controls (physical locks and passwords )
Software
Antivirus software
Access Controls
Discuss and describe the concept of software , Anti- virus, access control
Demonstrate an example of the Anti- virus software by showing a presentation
Divide student into groups and ask the student groups to identify the following topics and
discuss them
o Intellectual property acts (e.g. using software illegally)
o effect of viruses
o how to protect from illegal acts
o use of anti-virus software
Demonstrate some anti- virus software and access control methods
Quality inputs:
24
Reading Material
Computer Viruses
A virus is a computer code or program, which is capable of affecting your computer data badly
by corrupting or destroying them.
The ways that it can affect your computer are mentioned below
o By downloading files from the Internet.
o Through the pen drive.
o Through e-mail attachments.
o Through unprotected documents or poor administrator passwords.
Eg: McAfee Antivirus Plus, Symantec Norton Antivirus, Avast Pro A, Kaspersky
25
Competency 4 : Uses text editing software to type effectively
Time : 01 period
Learning Outcome:
Content:
Typing
Typing skill
Use the keyboard in a proper way
Typing text correctly and efficiently
Quality inputs:
Computer
Typing software (https://merabheja.com/top-free-typing-software/)
A paragraph typing
26
Reading Material
Finger Positions
o In their basic position, the fingers rest on the middle row of the keyboard- also called the "home
row". The home row is the base from which all other keys can be reached.
o Each key is pressed with the finger on the home row that is closest. After reaching a key away
from the home row, the finger needs to return to its home row key
o Use the right thumb for the space bar
o Use the right little finger to press Enter key
o Use the right hand shift key with the right hand little finger to type the uppercase letters that
are on the left side
27
Competency 5 : Uses programming language to develop simple programs (Using Scratch)
Competency Level 5.1: Analyzes simple problems by decomposing and connecting them logically
Time : 02 periods
Learning Outcome:
Contents:
Flow chart
Control structure
o Sequence
o Selection
o Repetition
Using analytical thinking techniques in a problem and solving it
Using the flowchart to solve the problem (only sequence type problem)
Quality inputs:
Flowchart symbols.
Scenarios (only sequence) for the problem.
28
Reading Material
Analytical problem solving skill is an important skill when analyzing the problem input, process, and
output are identified.
Start
Input: A sheet of paper suitable to write the assignment and a pen
Start
Length of a square
school
Multiply length by 4
Stop
29
Draw a triangle shape Start
Paper, Pencil
Triangle
Stop Stop
Stop
30
Competency 5 : Uses programming language to develop simple programs (Using Scratch)
Competency Level 5.2: Develops simple programs using a visual development environment
(Using Scratch)
Time : 03 periods
Learning Outcome:
Contents:
Programming Language
Scratch Programming
To analyze a problem to write an algorithm
Draw the flow chart and use the Scratch software to implement the program
Ask the student groups to draw a pentagon in scratch interface with sequential steps.
Quality inputs:
Computer
Scratch software
(https://download.cnet.com/Scratch/3000-2051_4-10680857.html)
31
Reading Material
SCRATCH is a new programming language that lets you create your own interactive stories,
animations, games, music, and art.
Scratch is a simple environment designed by the Kindergarden Lifelong Learning Group at MIT to
introduce some basic programming concepts in a fun and interactive manner. In Scratch, sprites
(objects) are manipulated on the stage (background) using various scripts (small program segments).
Each sprite has its own set of scripts to control its behavior and how it interacts with other sprites and
events. Programming consists of snapping together individual blocks of preexisting actions to create
a script. A program can be as simple as a single block or consist of multiple blocks stacked together
that will run as a unit.
Scratch Interface
When Scratch starts up, you will see a screen similar to the one below. The different areas have been
labeled.
32
Menu Bar:
The menu bar including ‘New’ project, ‘Open’ or ‘Save’ an existing project, ‘Save (a new project)
as’ whatever name you choose, ‘Undo’ a previous action, and obtain ‘Help’.
Block Descriptions:
The block description area lists the eight categories of blocks including Motion, Looks, Sound, Pen,
Control, Sensing, Numbers and Variables. The block categories are all color coded so they can be
found quickly to determine which category it came from.
Blocks Palette:
This area shows all the blocks available in the programming. Note that the blocks palette will change
depending upon the current block category. When selecting a new block category, the blocks palette
will change to reflect the new options available.
Scripts Area:
This is where you create and view the scripts pertaining to the current sprite.
Stage:
The stage is where all of the action takes place. The stage is 480 units wide by 360 units tall and the
center of the stage is at x-y coordinate (0, 0). This means the lower left is at (-240, -180), the upper
left is at (-240, 180), the upper right is at (240, 180), and the lower right at (240, -180).
Toolbar:
A number of tools exist for different purpose. The arrow is the default selection and it allows to pick
up and move sprites and blocks of code around. There are also options for you to duplicate and delete
items as well as grow and shrink your sprite.
Here find the name and picture of the current sprite together with its x-y position, direction, and
rotation style.
To create a script, we simply drag a block from the Blocks Palette onto the Scripts Area. To run it,
we can double-click it and observe what happens on the stage. Let’s try At the moment, our current
sprite is Sprite1 (the cat). By default, he is located in the center of the screen. You can drag him
anywhere on the screen that you wish at any time.
33
Motion Blocks
Let’s make him move 10 steps forward by selecting from the Blocks Palette and dragging it onto the
Scripts Area. When you double-click the block, you should observe the cat move 10 steps to the right.
You can double click the block as many times as you wish. The cat will continue to move.
You can edit the white text field portion of the block by clicking on the ‘10’ and changing it to
another number like ‘-10’. Double click it and see what happens. Now change it to ‘100’ and
observe the difference.
turn …. degrees
set x to
PEN Block
Clear
Pen Down
34
Pen up
Control
When..Clicked
Eg:-
wait.. secs
Eg:-
35
Step9:- Prepare the following scripts
Start
Paper, Pencil
Out put
Turn 120 0 Ant clock
anti- wise
clock wise
Triangle
Stop
Out put
36
Competency 5 : Uses programming language to develop simple programs (Using Scratch)
Time : 02 periods
Learning Outcome:
Contents:
Definition of variable
Use of variables in programs
Variable
Variable in stretch program
Use variables in computer programs.
Ask the groups to draw a flow chart to draw a rectangle with variable then use the a Scratch
program to draw a rectangles with variables.
Quality inputs:
Computer
Scratch Program (https://download.cnet.com/Scratch/3000-2051_4-10680857.html)
37
Reading Material
Variable
Variables are memory pieces that can contain values of data it can be used again and changed later.
Variable name
Variable names are the names you give to computer memory locations which are used to store
values in a computer program
There are two buttons displays in the block Blocks Palette. When clicked on the variable block, the
following image will be shown.
When clicked Make a variable in the Blocks Palette the following dialog box will be displayed.
Type the Variable name in the dialog box and select one
of the radio buttons and click OK.
For all sprites : Create a new variable that all sprites can
see (Such as Marks)
For this sprite only: Creates a new variable that only this
sprite can see.
38
Once a variable is created the following five blocks appears on the Blocks Palette.
Example
Draw a flow chart to draw a square with a variables and then use scratch program to draw the
square with variables.
Create two variables such as “Length”, “Rotate”.
Click the set Blocks in Blocks Palette and Drag and Drop in Sprite Area.
Click variable box and select the variable name (Length).
Click variable value box Type 100.
Do the above steps for the “Rotate” variable.
Start
Paper, Pencil
Square
Stop
39
Competency 5 : Uses programming language to develop simple programs (Using Scratch)
Time : 01 period
Learning Outcome:
Describes the effect of errors in a program and takes precautions to avoid errors
Contents:
errors
error-free program
expected output
Explain about error in a real life process. Then explain errors in programming.
Quality inputs:
Scratch Program(https://download.cnet.com/Scratch/3000-2051_4-10680857.html)
40
Reading Material:
Errors
An 'error' is a deviation from accuracy or correctness. A 'mistake' is an error caused by a fault: the
fault being misjudgment, carelessness, or forgetfulness. There are following types of errors in
computer programming languages.
Syntax errors:
To understand syntax errors in programming, it helps to think about syntax errors in a natural (human)
language like English. Syntax is the part of grammar that deals with how the words in a language are
arranged to create sentences. In Scratch program there are blogs of syntax to drag and drop so syntax
errors are less.
Logical errors: errors due to the fact that the specification is not respected.
Eg: In a Scratch program we use only the scratch program Blocks so that Syntax and Semantic errors
are less. Sometimes the expected output does not displayed the logical errors.
Bug
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to
produce an incorrect or unexpected result, or to behave in unintended ways. Bugs have been present
ever since the dawn of computer software.
Example 1:-
This is a structure in the Scratch program that one object moves 100 steps with line. However, there
is no line only the object moves 100 steps. So the Expected output is not displayed.
The structure of the Scratch has to be changed for the expected output. The correct structure of the
Scratch program is as follows.
41
Example 2:-
This is a structure in the Scratch program where one object goes in x: 50 and y: 50. However, it was
a mistyped as x: 500 and y: 500. So when it runs the object goes to the object on x: 269 and y: 218
because it is the maximum of x, y values. The correct structure of the Scratch program is as follows.
42
Competency 6 : Uses Presentation software to create a presentation
Competency Level 6.1: Uses basic functions of presentation software in creating a presentation
Time : 05 periods
Learning Outcome:
Contents:
Create, open, save and close a Presentation
Add Slide
Inserting files/objects (text, picture, shapes, clip art, word art etc.)
Formatting of Text
Add Multimedia and charts to a slide
Slide Designs
Move, duplicate, Hide and Delete Slides
Slide transitions
Quality inputs:
Computer
Assessment Tools
Sample presentation
43
Reading Material
Presentation
Presentation is used to sharing the views, options, ideas and knowledge with a large group of people.
There are many techniques, methods, multimedia and other tools to create Presentations effectively.
Number of lines
Font-size
Correct use of grammar and language
Use of color
Animation and videos
Attention on target group
Presentation Software
The software used to present the multimedia contents are called presentation software. There are
many presentation software available; open source software and proprietary (commercial) software.
Eg: Open office Impress - open source
Microsoft Office Power Point - proprietary (commercial) software
Create a Slide
Home Click new slide Icon
Duplicate Slide
Select the slide click copyselect the position that you want to duplicate click paste
Move Slide
Select the slide in slide layout panel Drag and Drop where you want
44
Slide Transaction
Change the way of transaction from one slide to another.
Slide Layouts
Home New slide or Slide Layout
Select theme from the given template
45
Competency 7 : Uses the services of the Internet and develops web pages
Time : 05 periods
Learning Outcome:
Contents:
WWW, URL
Download images, audio, video etc.
Accessing earth maps
Trusted and untrusted websites
Authentic and reliable information
Internet
WWW
URL
web browses
Web page and web side
Download documents, images, audio, video etc.
Accessing earth maps
Trusted and untrusted websites
Authentic and reliable information
46
Ask the student groups to find and save a picture of a Rose flower from anywhere in the
Internet
o Discuss the search engine with examples (Eg: Google website)
o Explain how to search with a specific keywords
o Discuss how to find images from the Internet
o Explain how to save a picture downloaded from the Internet, in a specific location
Discuss with the students about advantages of the search engines in finding different files,
images, data and information
Introduce websites useful and interesting for students (e.g: Accessing earth maps)
Discuss with students the trusted and genuine websites
Discuss with students the authentic and reliable information
Quality inputs:
47
Reading Material
Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -
a network of networks in which users at any one computer can, if they have permission, toget
information from any other computer. There are many services provided by the internet.
WWW Telnet Blogs
E-mail Newsgroup Social
Chat and E-Commerce Networking
Messaging E-Learning
WWW
The World Wide Web (WWW) is a network of online content that is formatted in HTML and
accessed via HTTP. The term refers to all the interlinked HTML pages that can be accessed over
the Internet. The World Wide Web was originally designed in 1991 by Tim Berners-Lee while
he was a contractor at CERN
URL
A URL (Uniform Resource Locator) is a form of URI and is a standardized naming convention
for addressing documents accessible over the Internet and the Intranet. An example of a URL
is http://www.nie.lk/, which is the URL for the NIE website.
Below is some additional information about each of the sections of the http URL for this page.
http://www.nie.lk/geneinfo 1 Protocol
2 3 2 Domain
1
3 Webpage
Web Browser
A web browser is a software program that allows a user to locate, access, and display web
pages.
Eg:-
Google Chrome Internet Opera
Mozilla Firefox Explorer Safari
Web Page
A webpage is an independent page of a website. For example, a webpage would be the
testimonials page. It can be accessed by typically one URL in a browser. A Web page can be
accessed and displayed on a monitor or mobile device through a Web browser.
Website
A website is a collection of Web pages that are under one domain (such as nie.lk). One website
has a many related web pages.
For example, if there is a school that owns a website that will have several Web pages like Home,
About Us, Contact Us, Staff, Teachers, Results, Performance, and others. All of these pages
together make up a Website.
48
Download Image
Any picture or image on the Internet can be saved to your computer
(downloaded). As an example, the following steps will show you how to
download the Computer Hope logo that you see to the right.
1. Right-click on the image.
2. From the drop-down menu that appears, select Save image as... or Save
Picture as.
3. Choose the location in which you want to save the image.
Download Audio
Downloading an audio file (e.g., an MP3) from a link is just like downloading any other basic
file from the Internet. For sites that utilize streaming audio or have the audio embedded into a
web page, different downloading techniques must be used, some of which are detailed on the
page linked below.
For sites that offer an MP3 download link. Save the MP3 by right-clicking on the link and
choosing the option to save link as, save target as, or the Save linked content as link. Once the
file is saved, it will appear in you downloads folder.
Download Video
Downloading a movie file (e.g., an MP4) from a link is similar to all other file downloads. Right-
click on the link and choose Save link as, Save target as, or the Save linked content as. If the
movie is embedded in the web page with an arrow pointing down next to the audio controls, use
that link to download the movie. Other streaming movie services that do not have a download
link may require additional software to capture the video; the link below has further instructions
YouTube has been designed to only allow users to watch and view videos on their website. Many
users want to download or save their favorite YouTube videos to their computer so they can
watch them without being connected to the Internet or on other devices. Below are the steps
required for downloading and watching YouTube videos on your computer for free.
1. First, go to the YouTube page containing the video you want to download. When you have
found the page,
2. Type savefrom.net/ in front of any YouTube address (URL).or type ….. between www
and the address in the specific URL
3. If done properly, below the link mentioned above, you will see a preview of the video (as
shown below), along with a green Download button and the video format. The default
format for downloading the video is either Low or Medium quality.
50
Competency 7 : Uses the services of the Internet and develops web pages
Competency Level 7.2: Uses offline (E-mail) and online (Chat) communication
Time : 02 periods
Learning Outcome:
Contents:
Quality inputs:
51
Reading Material
Short for electronic mail, e-mail or email is the exchange of information stored in a computer between
two users over telecommunications. More plainly, e-mail is a message that may
contain text, files, images, or other attachments sent through a network to a specified individual or
group of individuals.
In order to use email facility you are required to create an email account using an email software such
as Gmail, yahoo, Hotmail etc.
Advantages of e-mail
There are a number of advantages of e-mail and the usage of e-mail versus postal mail. Some of the
main advantages are listed below.
Free delivery - Sending an e-mail is virtually free, outside the cost of Internet service. There is
no need to buy a postage stamp to send a letter.
Global delivery - E-mail can be sent to nearly anywhere around the world, to any country.
Instant delivery - An e-mail can be instantly sent and received by the recipient over the Internet.
File attachment - An e-mail can include one or more file attachments, allowing a person to
send documents, pictures, or other files with an e-mail.
Long-term storage - E-mails are stored electronically, which allows for storage and archival
over long periods of time.
Environmentally friendly - Sending an e-mail does not require paper (paperless), cardboard,
or packing tape, conserving paper resources.
Video Conferencing
52
Skype
Undoubtedly the most popular name on this list, Skype has been around for a long time now. Skype
has a come a long way, and has only been notching up in offering the best video calls over the years.
The Skype interface is still the same, simple and easy to use, but has with time added many more
useful features. Skype offers both free and paid call facility. The paid version allows the user to call
any number across the world at a nominal price. You can not only make voice calls but also video
calls. So, stay in touch with your loved ones by downloading the software on your Windows PC
Viber
Viber is one of the popular social media. It has multiple features despite a simple interface. The app is
cost free and allows you to call any Viber user across the globe. Apart from video calls, the software
lets user chat with other Viber users. It has some of the most adorable stickers that you can send while
chatting with your loved ones. You can also sync your mobile Viber app with your Windows PC. To
start exploring what Viber has in store for you, click on:
53
Competency 7 : Uses the services of the Internet and develops web pages
Time : 02 periods
Learning Outcome:
Contents:
Web page
Web site
Introduction of HTML
HTML basic Tags
HTML formatting Tags
Insert an image in a web page
connect
Computer
Browser software
Text editing software (Notepad)
54
Reading Material
Web page
A web page is a document commonly written in HyperText Markup Language (HTML) that is
accessible through the Internet or other network using an Internet browser. A web page is accessed
by entering a URL address and may contain text, graphics, and hyperlinks to other web pages and
files
To view a web page requires a browser (e.g., Internet Explorer, Edge, Safari, Firefox, or Chrome).
Once in a browser, you can open a web page by entering the URL in the address bar.
Website
A website refers to a central location that contains more than one web page. For example, Computer
Hope is considered a website, which includes thousands of different web pages
HTML
55
Heading Tags
<h1> defines the most important heading. <h6> defines the least important heading.
Example 1 (ex1.html)
<html>
<head>
<title>First Page </title>
</head>
<body>
<h1>My first web page</h1>
<h1>Welcome every one</h1>
</body>
</html>
Step 5: Double click the file icon that you save or right click open with click the browser name
56
Text Formatting tags
Example 2 (ex2.html)
<html>
<head>
<title>Text formatting</title>
</head>
<body>
<h1>Animals</h1><br>
<b> Elephant<b><br>
<u> dog</u><br>
<i> cat</i>
</body>
</html>
Insert image
Images can improve the design and the appearance of a web page. In HTML, images are defined with
the <img> tag. The <img> tag is empty, it contains attributes only, and does not have a closing tag.
The src attribute specifies the URL (web address) of the image:
<img src="image name with extension"> image and the file be same folder
Color
In HTML, a color can be specified by using a color name (red, tomato, orange, gray, blue, violet,
slate blue). HTML supports 140 standard color names.
<body bgcolor="red">
57
Example 3 (ex3.html)
step 2: Copy a cat image and paste it same folder that you save html file and rename as cat
<html>
<head>
<title>Image </title>
</head>
<body bgcolor="violet">
<h1>Cat</h1>
<img src="cat.jpg">
</body>
</html>
Step 6: Double click the file icon that you save or right click open with click the browser name
HTML List
Unordered List:
Unordered HTML List starts with the <ul> tag. Each list item starts with the <li> tag.
cat <ul>
dog <li>cat</li>
elephant <li>dog</li>
<li>elephant</li>
</ul>
Ordered List:
Ordered HTML List starts with the <ol> tag. Each list item starts with the <li> tag.
1. cat <ol>
2. dog <li>cat</li>
3. elephant <li>dog</li>
<li>elephant</li>
</ol>
58
Example 4 (ex4.html) <html>
<head><title> List </title>
</head>
<body>
<h2>Unordered List</h2>
<ul>
<li>cat</li>
<li>dog</li>
<li>elephant</li>
</ul>
<h2>Ordered List</h2>
<ol>
<li>cat</li>
<li>dog</li>
<li>elephant</li>
</ol>
</body>
</html>
Unordered List
The list items will be marked with bullets (small black circles) by default:
Example 5 (ex5.html)
Conform ex1, ex2, ex3, ex4, ex5, cat.jpg, header.jpg, picture2.jpg in same folder
<html>
<head><title> website </title>
</head>
<body bgcolor="tomato">
<img src="header.jpg">
Competency Level 7.4 : Uses the Internet safely, securely and ethically
Time : 02 periods
Learning Outcome:
Contents:
Protection against unauthorized access and malware
o Hacking
o Virus attacks
o Software piracy
Protection in using the Internet against crime
o Cyber bullying
o Stealing others data
Online safety precautions against unknown parties (Email, social media etc.)
Quality inputs:
Computer with internet connection
60
Reading Material
Malware
Malware, or malicious software, is any program or file that is harmful to a computer user. Malware
includes computer viruses, worms, Trojan horses and spyware. These malicious programs can
perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or
hijacking core computing functions and monitoring users' computer activity without their permission.
Types of malware
There are different types of malware that contain unique traits and characteristics. A virus is the most
common type of malware, and it's defined as a malicious program that can execute itself and spreads
by infecting other programs or files.
A worm is a type of malware that can self-replicate without a host program; worms typically spread
without any human interaction or directives from the malware authors.
A Trojan horse is a malicious program that is designed to appear as a legitimate program; once
activated following installation, Trojans can execute their malicious functions.
Spyware is a kind of malware that is designed to collect information and data on users and observe
their activities without the users' knowledge.
o Hacking :
Hacking is unauthorized intrusion into a computer or a network. The person engaged in
hacking activities is generally referred to as a hacker. This hacker may alter systems or
security features to accomplish a goal that differs from the original purpose of the system.
o Virus attacks
The most potent and vulnerable threat to computer users is virus attacks. Virus attacks hamper
important work involved with data and documents. It is imperative for every computer user
to be aware about the software and programs that can help to protect the personal computers
from attacks
o Software piracy
Software piracy is all but impossible to stop, although software companies are launching more
and more lawsuits against major malpractices. Originally, software companies tried to
stop software piracy by copy-protecting their software.
o Passwords
Make sure a password has been set for your computer's operating system. The best way to
keep someone out of your accounts and personal information is to not let them on your
machine in the first place. You can always create additional accounts for guests. Information
on how to carry out these actions can be found in the following linked pages.
61
o Get a hardware or software firewall
Computer users are recommended to install a firewall in their computers. There are two ways
a firewall can protect your computer and network.
Software firewall - A software firewall is a software program that you install on your
computer to help protect it from unauthorized incoming and outgoing data. Keep in
mind that a software firewall is only going to protect the computer on which it has
been installed. Additionally, many antivirus scanners include their own version of a
firewall program.
o Malware protection
Trojans, viruses, spyware, and other malware can monitor your computer and log keystrokes
to capture sensitive data such as passwords and credit card information.
To help protect your computer from these threats, we suggest installing both virus and
spyware protection programs.
Today, e-mail is one of the most popular features on the Internet. Being able to identify threats
sent through e-mail can help keep your computer and your personal information safe. Below
are some of the most common threats you may encounter while using e-mail.
Attachments - Never open or run e-mail attachments from addresses with which you
are not familiar. Viruses, spyware, and other malware are commonly distributed
through e-mails that have attachments. For example, an e-mail may want you to open
an attachment of claiming to be a funny video, when it's really a virus.
o Alternative browser
Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft
Internet Explorer was notorious for security and spyware related issues. Although it has
improved since then we still highly recommend considering an alternative browser such as
Mozilla's Firefox or Google's Chrome.
62
o Install Antivirus Software
Antivirus is other means to protect the computer. It is software that helps to protect
the computer from any unauthorized code or software that creates a threat to the system.
Unauthorized software includes viruses, key loggers, Trojans etc. This might slow down the
processing speed of your computer, delete important files and access personal information.
Even if your system is virus free, you must install antivirus software to prevent the system
from further attacks of virus.
Antivirus software plays a major role in real time protection; it is an added advantage of
detecting threats helps.
63