Prepared by: Ms.
Soha Ashraf
Level 2nd: (2024) Meet the
Computer
Name:__________
Class: ___________
Chapter 1
Biometric Techniques
Introduction:
"Biometric techniques use special parts of your body, like your fingerprint or face, to
prove it's really you. It's like using a secret code that only your body knows to unlock
things, like your phone or computer. It's super cool because it keeps your stuff safe and
makes sure only you can access it!"
Fingerprint Scans:
"Fingerprint scans are like a special secret handshake between you and your device.”
Your fingers have tiny patterns called fingerprints that are unique to you, just like a
snowflake! When you place your finger on a scanner, it takes a picture of these patterns
to make sure it's really you trying to unlock your phone or computer. It's like having a
secret key that only fits your finger!
Retina Scans:
"Your retina is like a special camera in your eye that takes pictures of what you see. It's
located at the back of your eye, and it captures all the colors and shapes of the things
you look at. Just like a camera, it helps you see everything around you, from the colors
of a rainbow to the faces of your friends!"
Face Recognition:
"Face recognition is like a magic mirror that knows who you are just by looking at your
face! It's a special technology that uses cameras to take pictures of your face and then
checks if it matches with pictures, it already knows. It's like having a friend who always
recognizes you, even in a big crowd!"
Voice Recognition:
"Voice recognition is like having a friend who knows your voice really well. It's a special
technology that listens to what you say and understands it, just like you do with your
friends. It's like having a secret code word that only your device can understand, so it
knows it's really you talking!"
Review worksheet
Q: Fill in the blanks with the help of given word bank.
Retina Fingerprint scan Voice Face
Voice Fingerprints Retina Face
i. When you put your finger on a special machine to unlock your phone, you're doing
a _________________.
ii. Your eye has a special part called the ____________.
iii. When your phone looks at your ___________to know it's you, it's doing face
recognition.
iv. If your phone listens to your ____________ to understand who is talking, it's using
voice recognition.
v. Each person has unique____________________on their fingers.
vi. The __________at the back of your eye helps you see things.
vii. Face recognition works by recognizing the unique features of your____________.
viii. Voice recognition understands who is speaking by listening to their __________.
Chapter 2
Working with MS Paint
MS Paint is a drawing tool. We can use MS Paint to create simple drawings on the computer.
Paint button
Ribbon Color Palette
Drawing area
Q: Match the pictures with their names.
Line
Rectangle
Fill with Color
Eraser
Pencil
Shape tool
oval
Q: Look at picture carefully. Type the missing letters
R I B __ O __
C o_ o _ s P_ L E _T E
D_AWI_G A_EA
Practical:
Students will draw these shapes by using “shape tool” and fill them with different
colors.
Practical:
Students will draw a “smiley face”. by using shapes tool or pencil tool.
Practical:
Students will draw “night scenery”.
Chapter 3
Stepping into the Window
Microsoft windows is the most commonly used software to Start the computer.
Q: What is Desktop?
Ans: Desktop is the first screen that contains icons, background area and the taskbar.
Q: What is icon?
Ans: Icon is an image on the computer screen that represent an application. For
example,
Q: What is Start button?
Ans: Start button is a window like button that is located at the bottom left corner
of the screen.
Q: What is Start menu?
Ans: When we click on the start button a
menu appears that is called Start Menu.
Q: What is Taskbar?
Ans: The Taskbar is a bar at the bottom of the screen.
When we open a program or file/folder, its button
appears on the taskbar. It also shows date and time.
Q: What is a window?
Ans: A window is a boxed area in which you view programs,
Q: How can we change the size of a window?
Ans: We can enlarge the window to fill the entire screen.
Maximize Button
• Click the maximize button.
Minimize Button Close Button
Q: Match the following Icons with their names.
Youtube
Recycle bin
Google Chrome
My Computer
Subway Surfers
Q: Identify the parts of the desktop given below.
• Taskbar • Start Button • Shutdown
• All programs list • Desktop
Chapter 4
Viruses & its types
Virus:
"A virus is like a sneaky bug that can make your computer or device sick.”
Just like how you catch a cold from someone who's sick, your computer can catch a virus
from something bad you accidentally download or open. Viruses can make your
computer act funny, slow it down, or even stop it from working altogether. So, it's
important to be careful and keep your computer safe from viruses!
Types of Virus:
• Worm • Ransomware
• Trojan Horse
Worm:
"A worm virus is a sneaky bug that can copy itself and travel between computers, like a
worm wriggling from one place to another.”
It can spread quickly, so it's important to keep your computer safe!
Trojan Horse:
"A Trojan horse virus is a sneaky trickster that pretends to be something fun or helpful
but secretly causes trouble on your computer."
Ransomware:
"Ransomware is like a digital thief that locks up your files and asks for money to give
them back."
Antivirus:
An antivirus is like a superhero for your computer. It's a special program that helps
protect your computer from viruses. It's like having a shield that keeps your computer
safe from sneaky threats!
Review worksheet
Q: Choose the correct answer from each question.
i. What is a virus compared to?
a. A superhero b. A sneaky bug
c. A friendly helper d. A computer program
ii. What can viruses do to your computer?
a. Make it run faster b. Make it act funny or slow it down
c. Clean up unnecessary files d. Improve its performance
iii. What type of virus can copy itself and spread between computers?
a. Trojan Horse b. Ransomware
c. Worm d. Antivirus
iv. What does ransomware do to your files?
a. Deletes them permanently b. Encrypts them and demands money for
decryption
c. Copies them to other computers d. Renames them with funny names
v. What is an antivirus program like?
a. A digital thief b. A superhero for your computer
c. A sneaky trickster d. A harmless bug
vi. How does a Trojan horse virus behave?
a. It pretends to be something fun or b. It copies itself and spreads between
helpful but secretly causes trouble computers
c. It encrypts files and demands money d. It locks up your files and asks for
for decryption money to give them back
vii. What is the main purpose of an antivirus program?
a. To make your computer run slower b. To delete all your files
c. To protect your computer from viruses d. To spread viruses to other computers
viii. Why is it important to keep your computer safe from viruses?
a. Because viruses make your computer b. Because viruses can steal your files
run faster
c. Because viruses improve your d. Because viruses make your computer
computer's performance act funny
ix. What is the best way to protect your computer from viruses?
a. Ignoring antivirus software b. Downloading files from unknown
sources
c. Keeping your antivirus software up-to- d. Clicking on suspicious links
date
X. What can a worm virus do?
a. Encrypt your files b. Make your computer run faster
c. Copy itself and spread between d. Pretend to be something fun or helpful
computers