0% found this document useful (0 votes)
88 views2 pages

LAS English Q2-Wk 1

The document provides activity sheets for students in English 6. It includes 5 passages about various topics related to computers and technology. Students are asked to identify the type of informational text used in each passage by choosing from options like cause and effect, sequence/time, compare and contrast, description, and problem and solution. The passages cover topics such as computer bugs, input and output processes, drive-by download attacks, computer security precautions, and reasons for spreading computer viruses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views2 pages

LAS English Q2-Wk 1

The document provides activity sheets for students in English 6. It includes 5 passages about various topics related to computers and technology. Students are asked to identify the type of informational text used in each passage by choosing from options like cause and effect, sequence/time, compare and contrast, description, and problem and solution. The passages cover topics such as computer bugs, input and output processes, drive-by download attacks, computer security precautions, and reasons for spreading computer viruses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CALAOCAN ELEMENTARY SCHOOL

Name:________________________________________________ Score: ________________________


Grade & Section: _______________________________________ Date: ________________________

ACTIVITY SHEETS IN ENGLISH 6


Quarter 2-Week 1
I. Read and analyze the texts below. Complete the table by identifying the types of texts and the signal
words used.
Text Types Signal
Words
1. Having a cold is no fun. One problem about coughing is it makes falling asleep
hard for you. A sore throat is painful. One solution would be to try some tea with
honey in it. The honey will soothe your throat. There may be no cure for the
common cold, but you can treat the symptoms though.

2. The Taj Mahal is quite a building. It has four towers on its outside. These are
called minarets. The Taj itself rests on a large platform. In fact, the platform is a
186-foot square. On top of the platform rests the building and inner dome. It is
quite a sight!
3. Polar bears are excellent hunters who eat lots of seals. First, they use their sense
of smell to find seals. Seals hunt underwater but must surface to breathe. Then
polar bears wait for the seal to surface for air. They may wait for hours for this.
Polar bears are very patient hunters. Then, when the seal comes up for air, the
polar bear grabs it.
4. Some flamingos are pink but not all flamingos are pink. The pink color comes
from their diet. As a result of eating lots of shrimp, flamingos turned pink.
Consequently, flamingos that eat lots of algae will be pale or white.

5. Was T-Rex a scavenger or predator? A predator will hunt living animals while a
scavenger will look for other sources of food. Predators have eyes on the front of
their heads unlike scavengers' eyes which tend to be more to the side. T-Rex
probably did both.

II. Identify the type of informational text used in each number. Write only the letter of the correct answer. Choose
your answer below
a. cause and effect
b. sequence/time
c. compare and contrast
d. description
e. problem and solution
_________1. Not all bugs slither and crawl. A bug can also be an error in a computer program. When a computer tries
to read a program with a bug in it, the bug will affect the computer in one of two ways: the computer may process the
error and continue running the program. In this case the bug only has a small effect on the computer; however, if the
computer cannot process the error, then the bug will cause the computer to freeze and crash. This will require the user
to restart the program or the computer. Bugs are pesky to computer programmers and users.
_________2. Computers are very complex machines, but everything that they do can be put into two basic categories:
inputting and outputting. Inputting is when the computer accepts information entered by the user. Outputting is when
the computer returns information to the user. When you press a key on your keyboard, you input information. When
the letter that you pressed appears on your monitor, your computer is outputting. Both inputting and outputting require
the computer to process information, but input is controlled by the user and output is controlled by the computer.
Without inputting and outputting, there would be no computing.
__________3. Have you ever received an email from a strange address with nothing but a mysterious link in the
body? Don’t click that link! It may be a drive-by download attack, a common way of infecting computers. These
attacks may start as link in an email or Facebook inbox. If you click the link, your computer browser will connect to a
website created to attack computers. Once you have connected with the attack site, it will begin scanning your
computer for weaknesses. If it finds a weakness, your computer will begin downloading a harmful file. You will not
know that you are downloading this file. It will happen without your knowledge or permission. After the download is
complete, the file will run and the attacker will have control of your computer. As you continue browsing the internet,
you may not even realize that you have been victimized. The drive-by download attack is one of the most common
threats to computer users today.
__________4. Computer viruses are scary. If an attacker gets control of your computer, they can snoop through your
files, steal your sensitive information, and even use your computer’s webcam and microphone to spy on you. But just
because there are scary things on the Internet, doesn’t mean that we should stay off of the Internet. Instead, practice
safe habits such as installing virus protection. Virus protection will not protect you against all attacks, but it may stop
the most common ones. It also helps to keep your software up to date. Software updates close security holes. By
installing updates from software providers, you will have a stronger system. Perhaps the most important thing that you
can do is to be smart about how you browse. Don’t click on suspicious links and don’t open attached files unless you
are expecting them. The Internet can be a dangerous place, but you’ll be safer if you take a few precautions. Happy
browsing!
__________5. Viruses can mess up computers and make them run slowly. If you’ve ever gotten a virus on your
computer, you may have wondered why someone would go through all of that trouble just to ruin your computer.
There are two reasons why people spread viruses: money and power. If someone infects your computer with a virus,
they can make money by stealing your sensitive information and selling it to identity thieves. Or, they can gain power
by using your computer to attack other computers and websites to take them offline. Your computer makes an
attractive target to cybercriminals because they can use it to gain money and power.

Prepared by:
ZENY A. DOMINGO
Teacher III

You might also like