Page 184 - Computing E-Book Grade 6
P. 184
The City School 2020-2021
Intellectual Property: refers to creations of the human mind (also known as the
intellect) that are a non-physical (or intangible) form of property.
Layers: help you deal with different groups of shapes.
LEDs category: are all related to the Edison robot’s LED outputs.
LEFT: returns the first character or characters in a text string, based on the number of
characters you specify.
Legends: represents entries on the plotted area of chart or graph which are linked to
the data table of the chart or graph.
Libraries: gives access to a wide-range of assets.
Line tracking sensor: is made up of two parts: a red LED light and a light sensor.
Mail merge: is a useful tool that allows you to produce multiple letters, labels,
envelopes, name tags, and more using information stored in a list, database, or
spreadsheet.
Malicious software: is a kind of software that can be installed on a computer without
approval from the computer’s owner.
Menu bar: options such Save and Load are accessed from the menu bar.
Microsoft Access: is a database management system (DBMS) from Microsoft that
combines the relational Microsoft Jet Database Engine with a graphical user interface
and software-development tools.
MID: returns a specific number of characters from a text string, starting at the position
you specify, based on the number of characters you specify.
Minecraft play space: is the section of the interface where your program will run.
Multiple IF: is occasionally used when several conditions need to be checked in a single
cell.
Navigation pane: is a list containing every object in your database.
Netiquette: refers to how to behave online.
Not null: This constraint enforces that this field cannot be left unused.
Office 365: is a fully-featured web-based version of Microsoft Office.
Open shape: is a shape such as a line, arc, or zigzag.
OR: function to check if any out of a group of conditions are met.
Page border: is a border that appears outside the margins on each page.
Phishing: is a way that criminals get sensitive information (like usernames or
184
1 8 4

