Year 1
Log in Using a username and password to access a system. |
Username |
Avatar A digital picture to represent someone. |
Log out Leaving a computer system. |
Tools |
Password |
My work The place on Purple Mash where your work is stored. Only you and your teachers can access this. |
Notification A system that lets you know if you havesomething to look at. On Purple Mash, this is shown by a bell. |
Topics The area on Purple Mash that contains ready made reasources. |
Save Store your work as you create something so it can be accessed at a later time or date. |
Year 2
Button An objecy on the screen that can be clicked on. |
Event |
Key pressed Pushing down a key on the device's keyboard. |
Collision detection |
Debug/Debugging Looking for any problems in the code, fixing and testing them. |
Action |
Algorithm A precise step by step set of instructions used to solve a problem or achieve an objective. |
Background The part of the program design that shows behind everything else. It sets the scene for a story or game. |
Design mode |
Nesting When you write a command inside something else e.g. a block of commands could be nested inside a timer. |
Year 3
Website |
Webpage |
PEGI rating A rating that shows what age a game is suitable for. |
Spoof website |
Concept map A diagram that shows how different objects or ideas are related and connected. |
Username An identification used by a person with access to a computer, network or online service. |
Password |
Internet A global computer network providing a variety of information and communication facilities, consisting of interconnected networks and computers. |
Blog A regularly updated website or web page typically one run by an individual or small group, that is written in an informal or conversational style. |
Year 4
Email |
Copyright When the rights to something belong to a specific person. |
Identity theft When a person pretends to be someone else. |
Plagiarism When you use someone else's words or ideas and pass them off as your own. |
Digital footprint The information about a person that exists on the internet as a result of ther online activity. |
Computer virus |
Cookies A small amount of data generated by a website and saved by a web browser. Its purpose is to remember information about the user. |
Malware Software that is specifically designed to disrupt, damage or gain unathorised access to a computer system. |
Spam Messages sent over the internet, typically to many users for the purpose of advertising, phising or spreading malware. |
Phishing Practise of sending email pretending to be from reputable companies in order to pursuade individuals to reveal personal information, such as passwords and credit card details. |
Year 5
Online safety |
Reputable Having a good reputation. |
Shared image A picture that is shared online for other people to see. |
Password A string of characters that allows access to a computer system or service. |
Bibliography |
Reference A mention of a source of information in a book or article including online. |
Plagiarism The practice of taking someone else's work or ideas and passing them off as your own. |
Smart rules A set of rules based around the word SMART designed to help you stay safe when online. |
Encryption |
Identity theft The practice of using another persons name and personal information in order to obtain credit, loans etc. |
Citations A quotation from or reference to a book, paper or author especially in an academic work. |
Year 6
PEGI rating |
Password A string of characters that allow access to a computer system or service. |
Screen time Time spent using a device such as a computer, television or games console. |
Spoof website |
Digital footprint The information about a person that exists on the internet as a result of their online activity. |
Phishing The practice of sending emails prentending to be from a reputable company in order to pursuade individuals to reveal personal information such as passwords and credit card information. |