0% found this document useful (0 votes)
76 views27 pages

Ict JS2 Note Third Term

The document provides an overview of the internet and internet browsers for learners in JSS 2. It covers topics like what the internet is, how it works, internet browsers, the history of the internet, and characteristics of the internet. Class activities are included to help students understand key concepts.

Uploaded by

odunsal5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views27 pages

Ict JS2 Note Third Term

The document provides an overview of the internet and internet browsers for learners in JSS 2. It covers topics like what the internet is, how it works, internet browsers, the history of the internet, and characteristics of the internet. Class activities are included to help students understand key concepts.

Uploaded by

odunsal5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

LEARNERS NOTE FOR JSS 2 THIRD TERM

SCHEME OF WORK
1. The internet
2. Internet browsers
3. Benefits of the internet
4. E-mail
5. Search engines and their uses
6. Network groups
7. File sharing
8. Digital Divide
9. Digital Literacy
10. Revision
11. Examination
SUBJECT: ICT
WEEK ONE
DURATION: 45 MINUTES
TOPIC: THE INTERNET
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Explain the basic concept of the internet
b) Understand how the internet came to be
c) Be familiar with the internet environment
d) State the characteristics of the internet

CONTENT
Internet is defined as a global electronic communication network. It is one of the largest
networks that link trillions of computers all over the world. You can access this network via
communication devices and media such as modems, cable, telephone lines and satellite.
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite (TCP/IP) Transmission Control Protocol/Internet Protocol to link several
billion devices worldwide. It is a network of networks that consists of millions of private, public,
academic, business, and government networks of local to global scope, linked by a broad array
of electronic, wireless, and optical networking technologies.
The internet offers many conveniences at your fingerprints. You can send messages to others,
meet new friends, bank, invest, shop, fill prescription, file taxes, take online courses, play
games, listen to music or watch a movie on the internet, the advantage of the internet is that
you can use it from a computer anywhere in the world.
Success today in the business world requires knowledge of the internet. Without it, you are
missing out on a tremendous source for goods, services, information and, communication.
Here are some of the things one can do on the internet.
1. Banking called E-banking or Internet Banking
2. Invest
3. Shop for goods and services
4. Watch movies
5. Download and listen to music
6. Access Educational material e.g. Udemy
7. Access source of entertainment and leisure, such as online games, magazines or
vacation planning guide
8. Access other computer and exchange files, share and edit document with other in real
time
9. Provide information, photographs or audio or video clips

History of the Internet


The history of the internet begin with the following:
1. ARPANET: The US defense department created a project called Advanced Research
Project Agency (ARPA) in late 1960s, which was to work as network that would allow
scientist and military personnel to exchange information in war scenario without
disruption in communications. The network was connected in a way which ensured that
if one section of the network was damage, the remaining computer on the network
would still be able to communicate with each other. This network was called ARPANET.
By 1984, ARPANET had more than 1,000 individual computers linked as hosts.
2. NSFNET: In 1986, the national science foundation (NSF) connected its huge network of
five supercomputer center called NSFNET, to ARPANET. They used the technology
developed for ARPANET to allow universities and schools to connect to each other. By
1987, NSFNET could no longer handle the amount of information that was being
transferred. The national science foundation improved the network to allow more
information to be transferred. This configuration of complex came to be known as the
internet. Most of the people accessing the internet till late 1980s were scientist and
researchers. In the early 1990s, many companies started to offer access to home users.
This allows anyone with a modem and a computer to access the internet.
3. WORLD WIDE WEB: The World Wide Web was created in the early 1990s by European
organization for nuclear research. The goal of WWW was also to allow researchers to
work together on projects and to make project information easily accessible. The first
publicly accessible website was created in 1991. By the mid-1990s, over 30 million
people had access to the internet. Reach this huge market, most big companies created
their own sites on the World Wide Web or provide information about their products.
Now there are thousand companies on the web.

Internet Environment
An internet is a logical collection of networks supported by gateways, routers, bridges, hosts, and
various layers of protocols. An internet permits different physical networks to function as a single,
large, virtual network, and permits dissimilar computers to communicate with each other,
regardless of their physical connections. Processes within gateways, routers, and hosts originate
and receive packet information. Protocols specify a set of rules and formats required to exchange
these packets of information.
Protocols are used to accomplish different tasks in TCP/IP software. To understand TCP/IP, you
should be familiar with the following terms and relationships.
A client is a computer or process that requests services on the network. A server is a computer or
process that responds to a request for service from a client. A user accesses a service, which allows
the use of data or some other resource.
A datagram is a basic unit of information, consisting of one or more data packets that are passed
across an internet at the transport level.
A gateway is a functional unit that connects two computer networks of different network
architectures. A router is a device that connects networks at the ISO Network Layer. A router is
protocol-dependent and connects only networks operating the same protocol. Routers do more
than transmit data; they also select the best transmission paths and optimum sizes for packets.
A bridge is a router that connects two or more networks and forwards packets among them. The
operations carried out by a bridge are done at the physical layer and are transparent to TCP/IP and
TCP/IP routing.
A host is a computer, connected to a network that provides an access point to that network. A host
can be a client, a server, or a client and server simultaneously. In a communication network,
computers are both the sources and destinations of the packets. The local host is the computer to
which a user’s terminal is directly connected without the use of an internet. A foreign host is any
machine on a network that can be interconnected. A remote host is any machine on a network
that requires a physical link to interconnect with the network.
An internet address is a unique address identifying each node in an internet. Internet addresses are
used to route packets through the network. Currently, there are two versions used for internet
addressing: Internet Protocol version 4 (IPv4) and Internet Protocol version 6
(IPv6). Mapping relates internet addresses to physical hardware addresses in the network. For
example, in IPv4, the Address Resolution Protocol (ARP) is used to map internet addresses to
Token-Ring or Ethernet physical hardware addresses. In IPv6, Internet Control Message Protocol
Version 6 (ICMPv6) is used to map internet addresses to physical hardware addresses.
A network is the combination of two or more nodes and the connecting branches among them.
A physical network is the hardware that makes up a network. A logical network is the abstract
organization overlaid on one or more physical networks. An internet is an example of a logical
network.
Packet refers to the unit or block of data of one transaction between a host and its network. A
packet usually contains a network header, at least one high-level protocol header, and data blocks.
Generally, the format of the data blocks does not affect how packets are handled. Packets are the
exchange medium used at the internetwork layer to send and receive data through the network.
A port is an end point for communication between applications, generally referring to a logical
connection. A port provides queues for sending and receiving data. Each port has a port number for
identification. When the port number is combined with an internet address, a socket address
results.
Protocol refers to a set of rules for achieving communication on a network.

Characteristics of the Internet


The characteristics of the Internet that are clearly of importance in cyber libel proceedings are:
1. Its global nature
2. Interactivity
3. Its potential to shift the balance of power in the offline world
4. Accessibility
5. Anonymity
6. Its facilitation of republication
7. The prominence of intermediaries
8. Its reliance on hyperlinks/hypertext
9. Its long-term impact — the use of permanent archives
10. Its multimedia character
11. Its temporal indeterminacy

Class Task
1. Briefly describe the following terms: (i) Client (ii) Datagram (iii) Internet Address (iv) Host

Ticket-Out
1. Mention five things you can do on the internet.
2. State 5 characteristics of the internet.
SUBJECT: ICT
WEEK TWO
DURATION: 45 MINUTES
TOPIC: INTERNET BROWSERS
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Define the web browser.
b) Give examples of web browsers
c) Explain in full or part, how surfing the internet is made possible.

CONTENT
WEB BROWSER
A web browser is a software program that allows you to access and view web pages. The web
browser software is built on the hyperlinks, which allows users to point and click with a mouse in
order to jump from one document to another in whatever order they are desire.
Origin of Web Browsers
In January 1993, the first browser, viola and Midas were released for the X window system (UNIX).
At the same time, a Macintosh browser was released called ALPHA version.
In February 1993, the first popular graphical World Wide Web browser was NCSA Mosaic. It was
released for all common platforms (UNIX, windows and Macintosh) in September 1993.
Marc Andersen, the mastermind of mosaic, founded his own company, Mosaic communication
corp., now known as Netscape and released a browser, the Netscape navigator 1.0. He soon
controlled 70 percent of the browser market. Microsoft saw this gigantic success and soon released
a browser called MS internet explorer, for free, now new version of both browser support most
HTML.
Examples of Web Browser
1. MICROSOFT INTERNET EXPLORER: Microsoft internet explorer is the most widely used by
people around the world. It was developed by Microsoft in 1995 as a supportive package to
the Microsoft windows operating system.
2. MOZILLA FIREFOX: Mozilla fire fox is the second browser after the internet explorer. It can
be used on many different operating systems including windows, Macintosh, OS/2 and
UNIX. It is one of the first browsers to incorporate features such as tabbed browsing that
allows user to open multiple sites in a single window.
3. OPERA: Opera is a web browser that was developed by Opera software in 1996. It is a well-
known browser that is mainly used in activated mobile phone and smart phones. It is used
with many operating systems like Linux, MAC OS and MS window. It has a built-in features
such as ad-blocker, VPN, and battery saver mode. It is also highly customizable.
4. NETSCAPE NAVIGATOR: Netscape navigator was developed by Netscape Communication
Corporation and was very popular in the 1990s. It was compatible with almost every
operating system
5. GOOGLE CHROME: Chrome is the most popular web browser today. It is fast and easy to
use, it has a minimal design. It has a vast library of extensions and is considered the most
secure web browser today.
6. APPLE SAFARI: Safari is the default web browser for Apple devices such as Macs, iPhones
and iPads. It is fast and functional, and has a user-friendly interface. There is a built-in
feature that helps protect users’ privacy while surfing the web.
7. MICROSOFT EDGE: Edge is Microsoft’s latest web browser that replaced the Internet
Explorer. It is fast, streamlined, and has a clean design. One of its defining feature is its
integration with Microsoft’s digital assistant, Cortana.
8. BRAVE: Brave is a privacy-focused web browser that blocks all trackers, ads, and scripts by
default. It is also faster than most web browsers because it removes unnecessary codes
from websites.
9. TOR BROWSER: Tor is a highly secure web browser that uses a network of servers to hide a
user’s identity and browsing activity. It is popular among users who want to browse the web
anonymously.
10. MAXTHON: Maxthon is a cloud-based browser that allows users to take notes and capture
screenshots directly from it. It is fast and secure.

How Browsing/Surfing the Internet is made Possible


On the internet, data and information are transferred worldwide through the servers and clients
(which are computers) connected to the internet.
The computers which are responsible for management of resources i.e. program and data on a
network, by providing a centralized storage area, is called a SERVER. The computer which has an
access to the contents of the storage area on the server is CLIENT. On the internet, a client which
can access file and services on a number of servers is called a Host computer. Your computer is a
Host computer.
The inner structure of the internet resembles a transportation system. In the transportation system,
the maximum load of traffic is concentrated on the highways, which are linked to the major cities.
Similarly, on the internet, there are certain main communication lines which carry the maximum
load of traffic. These lines are collectively called the INTERNET BACKBONE.
The internet is a packet oriented network. It means that the data you transfer is divided into
packets.
So what happens when you transfer data across the internet various networks?
The networks are linked by special computer, called ROUTERS. A router checks where your
packet data goes and decides in which direction to send it. Of course, not every router is linked with
every other router, they just decide on the direction your data takes. The internet knows where
your data is going, as every destination has an address called an Internet Protocol (IP) address.
The data transferred with IP is divided into packets. This is handled by another protocol, the
transmission control protocol (TCP).
The internet is an addressing system used to send data and information to a fixed or specific
destination, just like the postal system. An IP address i.e. internet protocol address has its own
unique identification attached to a computer or a device connected to the internet. The IP address
has a group of number and is separated by a period (.). The number varies between 0 and 255. For
instance the number 10.199.212.2 is an IP address. Generally, the first part of the IP address
identifies the network and the last portion identifies a specific computer.
It is difficult to remember and use this all numeric IP address. Hence, the internet favours the use of
text name that represents one or more IP addresses.
The text version on IP is the domain name. The component of the domain name are separated by
periods just like an IP address.
Every domain name contains a Top Level Domain (TLD) abbreviation that identifies the type of
organization which is associated with the domain. Dot com (.com) is the name sometimes used to
describe an organization that has TLD of com. The domain name system is a system on the internet
that stores the domain names and their corresponding IP address. Each time you specify a domain
name, an internet server called the DNS server translates the domain name into its associated IP
address, so data can be routed to the correct computer.
WEB PAGE
Web page is an electronic document on the World Wide Web. A web page consists of a HTML file in
a particular directory on a particular machine (and in thus identification by a URL) a vast amount of
information is provided by these web pages. The information may include graphics, sounds, or even
movies. Usually, a web page contains links to other pages as well
WEBSITE
A website is a collection of web pages. Most websites have a home page as their starting point,
which frequently has a table of contents for the site. Users need a web browser and a connection to
access a website.
HOME PAGE
Home page is the first page retrieved when accessing a website. It serves as a table of contents for
the rest of pages on the site and offers links to other websites. For example, a company’s welcome
page typically includes the company logo, a brief description and links to the additional document
available on that site.
UNIFORM RESOURCE LOCATOR (URL)
The uniform resource locator is the address that defines the router to a file on the web. URLs are
typed into the browser to access web pages for example https://www.lagoozschools.com Retrieved
home page for Lagooz School website. The http is the web protocol and www.lagoozschools.com is
the domain name.
HYPERLINKS
Web pages contain highlighted text or image, called hyperlinks that connect to other pages on the
web. A hyperlink allows you to easily move through vast amount of information by jumping from
one web page to another. You can select a hyperlink to jump to a web page located on the
same computer or on a computer across the city, country or world. You can easily identify a text
hyperlink in a web page because it appears underlined and in color.
WEB SERVER
A web server is a computer on the internet that stores web pages. A web page is available for other
people to view, when it is stored in the web server.

Class Task
1. Define the web browser.
2. List 4 examples of web browsers.
3. What is (a) Server (b) Client (c) Router

Ticket-Out
1. Define the following: (a) Home Page (b) website (c) hypertext link (d) IP Address
SUBJECT: ICT
WEEK THREE
DURATION: 45 MINUTES
TOPIC: BENEFITS OF THE INTERNET
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) State the benefits of the internet

CONTENT
The benefits of the internet are as follows:
1. INFORMATION: The internet gives you access to information on any subjects of your
interest. This makes the internet a valuable research tool. Most sources such as newspaper
and magazines have websites and a number of them only exist online.
2. RESEARCH: You can make use of the internet search facilities to research just about any
topic you can think of. This information can help you with a school project, or a presentation
at work. You can search for the data you need, or go to specific research sites.
3. E-MAIL (electronic mail): Electronic mails enable us to exchange message with people
around the world, including friends, family members, colleagues, customers and even
people you meet on the internet. E-mail is an exciting feature of the internet as we can send
and receive message over long distances. It is also fast, easy and inexpensive.
4. ENTERTAINMENT: The internet offer many different forms of entertainment, such as radio
and television broadcast, video and music. You can find picture from the latest film, watch
live interview of your favorite celebrities and listen to music before it is available in stores.
5. PROGRAM: You can find thousands of programs that can be used on your computer, such
as word processors, drawing programs, games and accounting programs.
6. ONLINE SHOPPING: You can order for products on the internet, while sitting at home. You
can purchase items such as books, flowers, music, CDs, pizzas, stock and used cars.
7. CHATTING: Chat features allow you to exchange typed message with another person on the
internet. The message you send will instantly appear on the other person’s computer. You
can chat with a person or a group at the same time.
8. BANKING: You can use the internet to find financial sites that enables you to do your
banking and investing online. Banking online is much more convenient and much less time
consuming than doing it in person. Online banking is extremely secure because all modern
browsers support robust security protocol which ensures that your financial data remains
safe.
9. E-LEARNING: E-learning is a training or education program by electronic means. E-learning
involves the use of computer or an electronic device (GSM handset) to provide training on
educational technology as a tool for learning. Distant education can be done by e-learning.

Abuses of the internet


Internet abuse refers to improper use of the internet and may include:
1. Computer Crime – or cybercrime, is any crime that involves a computer and a network. Use
of computers for criminal activity.
2. Cyber-bullying – Use of the internet to bully and intimidate. The use of information
technology to repeatedly harm or harass other people in a deliberate manner.
3. Spam (electronic) – Is the use of electronic messaging systems to send unsolicited
messages (spam), especially advertising, as well as sending messages repeatedly on the
same site. Sending of unwanted advertising messages.
4. Malware – Software designed to harm a user’s computer, including computer viruses.
Malware, short for malicious software, is any software used to disrupt computer operation,
gather sensitive information, or gain access to private computer systems. Malware is
defined by its malicious intent, acting against the requirements of the computer user, and
does not include software that causes unintentional harm due to some deficiency.
Other ways of Abuse include:
1. You can get harassing/threatening messages from people or from stalkers.
2. It is very easy to find sites that promote hatred, violence, drug, sex, and other things not
appropriate for children.
3. There is no restriction on marketing products, such as alcohol, tobacco to children on the
internet.
4. Request for personal information for contests, survey etc. are used in unauthorized way.
5. Pornographic sites are easily found on the internet instead of it being restricted.

Class Task
1. Briefly explain three internet abuse
2. As a student, what are the benefits of the internet to you?
Ticket-Out
1. What is internet?
2. List the benefit of the internet.
3. Mention ways abusing the internet.
SUBJECT: ICT
WEEK FOUR
DURATION: 45 MINUTES
TOPIC: E-MAIL
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Understand the concept of the e-mail
2. State the types and uses of emails we have

CONTENT
E-mails or electronic mails refer to electronically transmitted messages that are sent and
received via the internet. They are a convenient method of communication that allows
individuals and organizations to communicate across distances. Although there are several
email service providers, some of the most popular email services include Gmail, Yahoo Mail,
Outlook, and ProtonMail, among others.
To use an email service, users need to be registered to any of the popular email service
providers. This registration is done by signing up on their platform. After a successful sign-up,
users can now send and receive mails. All send and receive actions is done through the users
email address. An example of an email address is [email protected]. This email address is
protected with a password (which should always be kept private) and other security features.

Types of Emails
1. Personal Emails: These are emails that individuals send to each other for personal
communication, such as keeping in touch with friends, family, and loved ones.

2. Business Emails: These are emails used for communication within an organization or for
professional purposes, such as exchanging information with colleagues or
communicating with clients or customers.

3. Marketing Emails: These are emails sent by businesses to promote their products or
services.

Uses of Emails
1. Communication: E-mails allow individuals and organizations to communicate quickly and
efficiently.
2. Storage: Emails can be used to store important messages, documents, and files.

3. Coordination: Emails can be used to coordinate business meetings, events, and other
activities.

Privacy and Abuse


While emails offer a convenient way to communicate, privacy is a major concern, especially
with respect to email security. Sometimes, hackers can hijack email accounts, and this can lead
to the compromise of sensitive information. Additionally, emails can be used for abuse, such as
spamming, phishing, and cyberbullying.

Examples of Email Service Providers


1. Gmail
2. Yahoo Mail
3. Outlook
4. ProtonMail
5. Zoho Mail.

In conclusion, emails offer a convenient and efficient way of communicating, and they come in
different types, including personal emails, business emails, and marketing emails. However, it is
important to be cautious about email security and possible abuse.

Ticket-Out
1. What is an email??
2. List the uses of the emails.
SUBJECT: ICT
WEEK FIVE
DURATION: 45 MINUTES
TOPIC: SEARCH ENGINES AND THEIR USES
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
Understand the basic concept of computer programming language.

CONTENT
Search engines are a powerful tool that helps us find information on the internet. These search
engines use complex algorithms to search and index millions of web pages and return relevant
results based on the user's search query.

Types of Search Engines


There are several types of search engines, including:
1. General search engines: These search engines are the most commonly used and provide
a wide range of results. Some examples include Google, Bing, and Yahoo.
2. Specialized search engines: These search engines are designed for specific types of
content or topics. Examples include PubMed for medical research and Wolfram Alpha
for mathematical computations.
3. Meta search engines: These search engines combine results from multiple search
engines to provide a more comprehensive search experience. Examples include Dogpile
and Yippy.

Uses of Search Engines


1. Research: People can use search engines to gather information for research papers or
projects.
2. Shopping: Online shopping is made easier using search engines as people can find a
wide range of products and compare prices.
3. Entertainment: Search engines can be used to find movies, TV shows, and music.
4. News: People can stay updated on current events by using search engines to find news
articles.

In conclusion, search engines are an essential tool in finding information on the internet. With
their ability to search and index millions of web pages, they make it easier and more convenient
for people to find information, shop, stay informed, and be entertained.
Class Task
1. What are the types of search engines?
2. Give 2 uses of search engine.
SUBJECT: ICT
WEEK SIX
DURATION: 45 MINUTES
TOPIC: NETWORK GROUPS
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Explain what computer network means
b) State the major types of computer networks
c) Explain network topology and the types

CONTENT
Computer Network
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams. A network is defined as a group of two or more computer systems linked together.
Computer networks allow you to share information with friends, family, coworkers and
customers. Network file sharing is the process of copying data files from one computer to another
using a live network connection.
Before the Internet and home networks became popular, data files were often shared using floppy
disks. Nowadays, some people still use CD-ROM / DVD-ROM disks and USB sticks for transferring
their photos and videos, but networks give you more flexible options.
Types of Network
In this lesson, we would be looking at 4 major types of networks. They are:
1. Personal Area Network – The smallest and most basic type of network, a PAN is made up of
a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around
one person in one building. These types of networks are typically found in small offices or
residences, and are managed by one person or organization from a single device. Often
used at home, this network is more on connections between a computer and another
gadget such as a telephone or a modem.
2. Local Area Network – A connection that’s used for groups of computers. This is common in
small offices and internet cafes. This is where everyone can share files basically, and is also
known to be a good way to connect between computers whenever they want to share an
internet connection, or whenever they want to play games with each other.
3. Metropolitan Area Network – A more powerful version of the local area network where it
can cover up the whole city in terms of connection. A huge server is usually used for this
type of connection.
4. Wide Area Network – This is a common type of network nowadays that’s made possible by
wireless technology. As the term implies, a WAN spans a large physical distance. The
Internet is the largest WAN, spanning the Earth. Usually, a credential or service from a
certain company is needed to enter a connection in this type of network, but there are
others that can be used for free. This is good for internet connection. The internet is a well-
known version of this one. A WAN is a geographically-dispersed collection of LANs. A
network device called a router connects LANs to a WAN. In IP networking, the router
maintains both a LAN address and a WAN address.

Other types of computer network in use today are:


1. Storage Area Network – A type of network that specializes in file sharing and other matters
in storing various software within a group of computers.
2. Enterprise Private Network – This is a software network that’s often used in businesses so
that they can have privacy over files and interactions between computers.
3. Virtual Private Network – This is a software that’s capable of setting up a network where
everyone registered in the network using a credential will be able to access each other
through other registered computers.
4. Wireless Personal Area Network (WPAN) which is virtually a synonym since almost any
personal area network would need to function wirelessly. Conceptually, the difference
between a PAN (personal area network) and a wireless LAN (Local Area Network) is that the
former tends to be centered around one person Network while the latter is a local area
network (LAN) that is connected without wires Network and serving multiple users.
5. Wireless Networks The fastest growing segment of the computer industry is the mobile
computers such as notebook computers and personal digital assistant (PDAs).The wireless
networks are becoming increasingly important because the wired connection is not possible
in cars or airplanes. Wireless networks can have many applications. A very common
example is the portable office. People traveling on road often want to make use of their
portable electronic equipment for telephone calls, e-mails, faxes, read remote files etc.
Wireless networks can exist on trucks, buses, taxies, aero planes etc. They are used where
the telephone systems are destroyed in the event of disasters such as fires, floods and
earthquakes etc. The wireless networks are important for military. Wireless networks and
mobile computing are related but they are not identical because portable computers are
sometimes wired and some wireless computers are not portable.

Types of Network Topology


A topology for the network is known to be a layout for the connected devices. This is important
because this is used to provide a proper flow of data within the said network. Here are the various
topologies:
1. Bus – This is the type of structure that uses a single medium to connect the computer.
2. Ring – Each computer is connected to another neighboring computer for data transfer. One
failed network can cause all networks to turn off.
3. Star – This is a structure that’s common in homes. It uses a certain hub or a router to make
the network possible.
4. Tree – This is a complicated structure that connects the star into multiple buses. This is
common for internet cafes and offices.
5. Mesh – this is a connection that leads to various data transmissions which are perfect for
routing huge networks.

Class Task
1. Where can the LAN be applied?
2. State 2 uses of the wireless network.

Ticket-Out
1. List and explain in your own understanding, the four major types of networks
2. Name three types of Network topology
SUBJECT: ICT
WEEK SEVEN
DURATION: 45 MINUTES
TOPIC: FILE SHARING
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Define file sharing
b) State the various methods of file sharing we have.

CONTENT
File sharing
File sharing is the practice of sharing or offering access to digital information or resources,
including documents, multimedia (audio/video), graphics, computer programs, images and e-
books. It is the private or public distribution of data or resources in a network with different levels
of sharing privileges.
File sharing can be done using several methods. The most common techniques for file storage,
distribution and transmission include the following:
1. Removable storage devices
2. Centralized file hosting server installations on networks
3. World Wide Web-oriented hyperlinked documents
4. Distributed peer-to-peer networks
SUBJECT: ICT
WEEK EIGHT
DURATION: 45 MINUTES
TOPIC: DIGITAL DIVIDE
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Describe the concept of and define digital divide
2. Identify how the digital divide can be bridged.
3. Expatiate on the old and new economy.

CONTENT
The present age is referred to as the digital age. It is called a digital age because the current
global economy is driven by a digital device known as the computer. The computer represents
data and instructions in 0s and 1s called binary codes, hence, it is known as a digital device. One
of the reasons for inventing the computer is to reduce the world to a global village. To achieve
this, everyone must have access to a computer (mobile phone, laptop, etc.) and internet
connectivity. But this is not the case. Some classes of people have effective access and coverage
to information and communication technologies and others have little or no access at all.
Hence, there is a digital gap or split between these two groups of people. This gap or split is
called Digital Divide

Definition of Digital Divide


Digital divide refers to the gap between people with effective access to digital and
information technology and those with very limited or no access at all.
Digital Divide, or digital split, is a social issue referring to the differing amount of information
between those who have access to the Internet and those who do not have access.
The term became popular among concerned parties, such as scholars, policymakers, and
advocacy groups, in the late 1990s.

Bridging the Digital Divide


Digital divide can be bridged. The basic steps would be
1. To provide digital access to those in the community who do not have it.
2. To reduce the base price of ICT gadgets or subsidize them.
3. Enlighten the masses on the importance of ICT in our current global economy.

The Old Economy versus the New Economy


Economy is the system by which the wealth of a nation or country is made.
The Old Economy
The old economy was centered on industrialization. Industrialization is the development of
industries in a country or region on a wide scale. An increase in productivity was achieved by
investing a large amount of capital in physical plant facilities. Investment in information systems
were relatively small.

Features of the Old Economy


The old economy had the following characteristics:
1. Its processes were time-consuming.
2. It requires a lot of labour.
3. It was mechanically driven.
4. It was constrained by time, space and distance.

The New Economy


Toward the end of the old era, the investment in computers increased, particularly as the
transition from manual data processing systems to computer data processing systems took
place. The transition can be regarded as a shift from the old to the new economy.

Features of the New Economy


1. It is digital.
2. Time, distance and space are irrelevant..
3. It is technology driven.
4. It is knowledge-based.
Limitations of Old Economy to the New Economy
The limitations of the old economy to the new economy are:

OLD ECONOMY NEW ECONOMY

1. Slower and linear 1. Fast and unpredictable

2. Local competition 2. Global hyper competition

3. Information and communication


3. Automation and mechanization
technology

4. Limited learning skills required 4. Continuous learning skills required

5. Capital intensive 5. Knowledge and people capabilities

6. Covers small area 6. Covers large area

Benefits of the New Economy


1. The size of the pieces of equipment was reduced.
2. Businesses can start with small capital.
3. Creates new jobs
4. Attract new investment and encourage export
5. Greater competition.

Class Task
1. Define digital divide.
2. State 2 characteristics of the old and new economy.

Ticket-Out
1. What were some of the limitations of the old economy as compare to the new
economy?
2. State 4 benefits of the new economy.
3. Explain how the digital divide can be bridged.
SUBJECT: ICT
WEEK NINE
DURATION: 45 MINUTES
TOPIC: DIGITAL LITERACY
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Understand what digital literacy means.
2. State the types of digital literacy that exists.
3. Give characteristics of digital literacy.

CONTENT
Meaning of Digital Literacy

Digital Literacy is the ability of individual to use digital technology tools to access, manage,
integrate, analyze and evaluate information and communicate with others in order to
participate effectively in society”.

Digital literacy encompasses computer hardware, software, the Internet, cell phones, PDAs, and
other digital devices. A person using these skills to interact with society may be called a digital
citizen.

DIGITAL CITIZENSHIP

Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard
to technology use.

1. Digital access: full electronic participation in society.

2. Digital commerce: electronic buying and selling of goods.

3. Digital communication: electronic exchange of information.

4. Digital literacy: process of teaching and learning about technology and the use of
technology.

5. Digital etiquette: electronic standards of conduct or procedure.


6. Digital law: electronic responsibility for actions and deeds.

7. Digital rights and responsibilities: those freedoms extended to everyone in a digital


world.

8. Digital health and wellness: physical and psychological well-being in a digital technology
world.

9. Digital security (self-protection): electronic precautions to guarantee safety.

TYPES OF DIGITAL LITERACY.

1. Photo-visual literacy: This is the ability to read and deduce information from visuals.

2. Reproduction literacy: This is the ability to use digital technology to create a new piece
of work or combine existing pieces of work together to make it your own.
3. Branching literacy: This is the ability to successfully navigate in the non-linear medium of
digital space.
4. Information literacy: This is the ability to search, locate, assess and critically evaluate
information found on the web.
5. Socio-emotional literacy: This refers to the social and emotional aspects of being
present online, whether it may be through socializing, and collaborating, or simply
consuming content.
6. Media literacy: This involves the interpretation and production of shared meanings, and
the ability to access, analyze, evaluate and create messages across a variety of contexts.

CHARACTERISTICS OF DIGITAL LITERACY

1. It supports and helps develop traditional literacy

2. It's a life-long practice


3. It's about skills, competencies and critical reflection on how these skills
4. It's about social engagement

DIGITAL LITERACY USE IN EDUCATION

Schools are updating their curriculum for digital literacy to keep up with accelerating
technological developments. This often includes computers in the classroom, the use of
educational software to teach curriculum, and course materials being made available to
students online. Some classrooms are designed to use smart boards and audience response
systems. These techniques are most effective when the teacher is digitally literate as well.

Teachers often teach digital literacy skills to students who use computers for research. Such
skills include verifying credible sources online and how-to cite web sites. Google and Wikipedia
are used by students "for everyday life research. Educators are often required to be certified in
digital literacy to teach certain software and, more prevalently, to prevent plagiarism amongst
students.

DIGITAL LITERACY USE IN THE WORKFORCE

Many jobs require a working knowledge of computers and the Internet to perform basic
functions. As wireless technology improves, more jobs require proficiency with cell phones and
PDAs (sometimes combined into smart phones).

Some jobs are increasingly performed primarily on computers and portable devices. Many of
these jobs require proof of digital literacy to be hired or promoted. Sometimes companies will
administer their own tests to employees, or official certification will be required.

Manufacturers and retailers, for example, are expected to collect and analyze data about
productivity and market trends to stay competitive. Construction workers often use computers
to increase employee safety. Job recruiters often use employment Web sites to find potential
employees, thus magnifying the importance of digital literacy in securing a job.

Class Task
1. What is digital literacy?
2. What are 2 characteristics of digital literacy?
3. State 3 types of digital literacy we have.

Ticket-Out
1. Define digital citizenship
2. State 5 areas of digital citizenship

You might also like