Tejas and Jyoti are back to school after the summer break. Moz asks them how them to revise what they learnt in Level 5. He lays out a set of questions for them to answer.

What are the different steps of gathering information?

[add context to the following? Search for educational computer games?]

Step 1: Identify the goal and State it clearly.

1.1 Discuss about the task with your partners.

1.2 Identify and define the goal. State it clearly.

Step 2: Analyze the goal and identify the requirements for sub-tasks.

2.1 Identify various sub-tasks of the goal.

2.2 Identify requirements related to each sub-task.

2.3 List what you already know about the requirements of each sub-task.

2.4 List the questions to which, you need to find answers.

2.5 Write down ‘What you know’ and ‘What you do not know’.

Step 3: Identify the information required to accomplish each sub-task.

3.1 Gather the information required for each sub-task.

3.2 Classify the information being gathered into categories.

3.3 List the classifications of each sub-task.

Step 4: Identify resources that provide information about each sub-task.

Some sources of information are:

Libraries, Internet, places related to the task.

People like parents, grandparents, teachers, and friends.

Step 5: Record information in a note-book or paper.

5.1While finding information:

5.1.1 From people: Be prepared with a set of questions. This helps you to not miss any important information.

5.1.2 From resources like libraries, books and Internet:

Note down the information as you are reading.

5.3 Capture the information under appropriate categories.

5.4 Search all available resources to get answers for all the questions that you had listed.

5.5 Lookout for other important information regarding the task.

Step 6: Consolidate and organize the information gathered from various resources.

5.3.1 Group related information into categories.

5.3.2 . Lists, tables and Venn diagrams are different ways of consolidating information.

What are the different steps of decision making?

Step 1: Gather and consolidate information.

Step 2: Identify the constraints (conditions to be satisfied).

Step 3: Use logical thinking to identify choices that satisfy the constraints.

Step 4: Take the decision.

What are the advantages of writing items as a list in the examples that you have given?

The list helps us to easily remember instructions. It also helps us to check if we have completed all tasks.

How can lists be organized?

Lists can be organized in multiple ways. One of the ways to arrange items in the list is in alphabetic order. Another way is to organize it sequentially. If the order in which the items listed are to be done is important, number the items in the list.

What are the different uses of a list?

A list is useful to:

  • Organize information systematically.
  • Highlightimportant points in long sentences and paragraphs.
  • Enhance readability and grab reader’s attention.
  • Remember instructions and announcements.
  • Find the information that we need faster.
  • Know order in which tasks need to be done.

What are the different uses of a table?

A Table is useful to:

  • Organize a collection of related data in rows and columns.
  • Find information easily.
  • Catch attention of the reader.
  • Compare information on different categories.

Fill in the blanks

The intersection of a row and column is called a cell.

Lists and tables help us to organize and consolidate information.

Use lists for information that can be contained in a single column.

Use tables for information that requires multiple columns.

A document or image saved on a computer as a file is called asoft copyand the printout of the document is called a hard copy of the document.

What is a computer network?

A computer network is a collection of computers and devices interconnected to one another. Devices in a computer network can be shared by users of the network. Files, data and information on the computers in a computer network can also be shared by users of the network.

What is a computer virus?

A computer virus is a program that can attach to files and perform actions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files). To avoid virus attacks on computers, scan the attachments received along with e-mail using a virus protection software.

Fill in the blanks

  • Internet is a combined collection of many interconnected computernetworks around the world.
  • Sharable information on the Internet is called the World Wide Web (www).
  • A web site is a collection of related web pages of information.
  • Information on a web site is accessed by using the Internet applicationcalled the browser.
  • A web site is accessed by using the web site address called the URL.
  • A hyperlink is a mechanism by which a web page is linked to another related web page.
  • If you move your mouse over a hyperlink, it will usually change to theshape of a hand.
  • The Back button takes you to the web page which you were viewing, before coming to the present page.
  • The Forward button has the opposite function of the Back button. It takes you forward to the next web page, within a sequence of pages that you have already accessed.
  • The address of a web site that you would like to visit again can be saved using Bookmarks.
  • A web search engine is a web site that helps you search for information on the World Wide Web.
  • The search results are usually presented as a list of links.
  • To send and receive mails electronically using computers, use e-mail.
  • The unique identification in combination with the e-mail service provider’s name is called the email address or the email Id of the user.
  • Sending identical messages to numerous recipients by email when it is really not necessary, is called spamming.

What are the safety measures for Internet browsing and searching?

  • Seek permission of parents/teachers before using Internet.
  • Do not give personal information while browsing.
  • Close the pop up. Do not perform any action requested by the pop up. This may cause the applications on your computer to stop working.
  • When you come across information that you do not like or is upsetting, inform and discuss with your parents about the same.

What are the safety measures while sending and receiving emails?

  • Do not share your password with anyone not even your best friend.
  • Always check with your parents before reading email from someone you donot know.
  • Beware of viruses in attachments. Scan attachments before downloading.
  • Always check with elders whom you trust before believing any informationmailed to you.
  • Send mails to multiple users only if it is absolutely necessary. Do not Spam.