Computer Studies Schemes Form 2 Term 3
Computer Studies Schemes Form 2 Term 3
SECONDARY SCHOOL
COMPUTER SCHEMES OF WORK
FORM TWO TERM THREE 2023
WEEK LESSON TOPIC/ OBJECTIVES TEACHING METHOD TEACHING/ REMARKS
SUB-TOPIC LEARNING
RESOURCES
Assignment
Attempt review questions 4.1 No.
1,2……..10
2&3 Manipulating text By the end of the lesson, the learner - question and Longhorn Bk 2
using the toolbox should be able to: answer method Computer Studies
i) use text tool - demonstration By S. Mburu &
ii) use text frame method G. Chemwa
iii) manipulate graphical objects using P 141-144
the toolbox
iv) apply stroke and fill
WEEK LESSON TOPIC/ OBJECTIVES TEACHING METHOD TEACHING/ REMARKS
SUB-TOPIC LEARNING
RESOURCES
4 1 Paragraph By the end of the lesson, the learner - question and Longhorn Bk 2
formatting should be able to: answer method Computer Studies
i) set indent and tabs - demonstration By S. Mburu &
ii) add space above or below paragraphs method G. Chemwa
iii) carryout page formatting P 150-152
iv) set page number
2&3 Rearranging pages By the end of the lesson, the learner - demonstration Longhorn Bk 2
should be able to: method Computer Studies
i) sort pages - discussion method By S. Mburu &
ii) insert page and column breaks G. Chemwa
iii) adding headers and footer to P 153-156
publication
WEEK LESSON TOPIC/ OBJECTIVES TEACHING METHOD TEACHING/ REMARKS
SUB-TOPIC LEARNING
RESOURCES
5 1 Tracking and By the end of the lesson, the learner - question and Longhorn Bk 2
kerning should be able to: answer method Computer Studies
i) define the terms: - demonstration By S. Mburu &
tracking method G. Chemwa
kerning - discussion method P 156-159
ii) apply a track
iii) apply kerning
iv) use ruler to measure objects
Assignment
Attempt review question 4.3 No. 1,2……
6
2&3 Formatting By the end of the lesson, the learner - demonstration Longhorn Bk 2
graphical objects should be able to: method Computer Studies
i) change fill and stroke of graphics - discussion method By S. Mburu &
ii) reshape objects G. Chemwa
iii) wrap text around a graphical object P 159-162
iv) import graphics from scanner
6 1 Rotating an object By the end of the lesson, the learner - demonstration Longhorn Bk 2
should be able to: method Computer Studies
i) rotate an object - discussion method By S. Mburu &
ii) crop an object G. Chemwa
iii) perform practical activity 4.3 P 164-166
Assignment
Attempt review questions 4.4 No.
1,2….8
2&3 INTERNET AND By the end of the lesson, the learner - question and Longhorn Bk 2
E-MAIL should be able to: answer method Computer Studies
i) define the term internet - demonstration By S. Mburu &
ii) explain on development of internet method G. Chemwa
iii) explain on the importance of internet - discussion method P 168-172
iv) explain on telecommunication
facilities
7 1 Internet services By the end of the lesson, the learner - demonstration Longhorn Bk 2
should be able to: method Computer Studies
i) explain on internet services: - discussion method By S. Mburu &
the world wide web (www) G. Chemwa
electronic mail (e- mail) P 172-176
electronic commerce
electronic learning
internet fax
ii) access the internet
2&3 Log in / sign in By the end of the lesson, the learner - brief lecture method Longhorn Bk 2
should be able to: - demonstration Computer Studies
i) explain the meaning of logging in and method By S. Mburu &
signing - discussion method G. Chemwa
in P 176-182
ii) define the terms; surf/browse,
hyperlink
iii) down load
iv) explain on electronic mail, e-mail
software,
file attachment, on-line meetings,
telephone
messages and contact management
8 1 Data security and By the end of the lesson, the learner - demonstration Longhorn Bk 2
controls should be able to: method Computer Studies
i) define the terms: private data and - discussion method By S. Mburu &
confidential G. Chemwa
data P 185-187
ii) state various types of viruses
iii) explain on control measures against
virus
iv) explain on control measures against
unauthorized access
2&3 Control measures By the end of the lesson, the learner
against computer should be able to:
crimes and i) control against theft
accidental access ii) explain on computer crimes
iii) explain on methods of detection and
protection against computer crimes
audit trial, data encryption
9
EXAMS, MARKING AND CLOSING THE
SCHOOL