Ict JS2 Note Third Term
Ict JS2 Note Third Term
SCHEME OF WORK
1. The internet
2. Internet browsers
3. Benefits of the internet
4. E-mail
5. Search engines and their uses
6. Network groups
7. File sharing
8. Digital Divide
9. Digital Literacy
10. Revision
11. Examination
SUBJECT: ICT
WEEK ONE
DURATION: 45 MINUTES
TOPIC: THE INTERNET
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Explain the basic concept of the internet
b) Understand how the internet came to be
c) Be familiar with the internet environment
d) State the characteristics of the internet
CONTENT
Internet is defined as a global electronic communication network. It is one of the largest
networks that link trillions of computers all over the world. You can access this network via
communication devices and media such as modems, cable, telephone lines and satellite.
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite (TCP/IP) Transmission Control Protocol/Internet Protocol to link several
billion devices worldwide. It is a network of networks that consists of millions of private, public,
academic, business, and government networks of local to global scope, linked by a broad array
of electronic, wireless, and optical networking technologies.
The internet offers many conveniences at your fingerprints. You can send messages to others,
meet new friends, bank, invest, shop, fill prescription, file taxes, take online courses, play
games, listen to music or watch a movie on the internet, the advantage of the internet is that
you can use it from a computer anywhere in the world.
Success today in the business world requires knowledge of the internet. Without it, you are
missing out on a tremendous source for goods, services, information and, communication.
Here are some of the things one can do on the internet.
1. Banking called E-banking or Internet Banking
2. Invest
3. Shop for goods and services
4. Watch movies
5. Download and listen to music
6. Access Educational material e.g. Udemy
7. Access source of entertainment and leisure, such as online games, magazines or
vacation planning guide
8. Access other computer and exchange files, share and edit document with other in real
time
9. Provide information, photographs or audio or video clips
Internet Environment
An internet is a logical collection of networks supported by gateways, routers, bridges, hosts, and
various layers of protocols. An internet permits different physical networks to function as a single,
large, virtual network, and permits dissimilar computers to communicate with each other,
regardless of their physical connections. Processes within gateways, routers, and hosts originate
and receive packet information. Protocols specify a set of rules and formats required to exchange
these packets of information.
Protocols are used to accomplish different tasks in TCP/IP software. To understand TCP/IP, you
should be familiar with the following terms and relationships.
A client is a computer or process that requests services on the network. A server is a computer or
process that responds to a request for service from a client. A user accesses a service, which allows
the use of data or some other resource.
A datagram is a basic unit of information, consisting of one or more data packets that are passed
across an internet at the transport level.
A gateway is a functional unit that connects two computer networks of different network
architectures. A router is a device that connects networks at the ISO Network Layer. A router is
protocol-dependent and connects only networks operating the same protocol. Routers do more
than transmit data; they also select the best transmission paths and optimum sizes for packets.
A bridge is a router that connects two or more networks and forwards packets among them. The
operations carried out by a bridge are done at the physical layer and are transparent to TCP/IP and
TCP/IP routing.
A host is a computer, connected to a network that provides an access point to that network. A host
can be a client, a server, or a client and server simultaneously. In a communication network,
computers are both the sources and destinations of the packets. The local host is the computer to
which a user’s terminal is directly connected without the use of an internet. A foreign host is any
machine on a network that can be interconnected. A remote host is any machine on a network
that requires a physical link to interconnect with the network.
An internet address is a unique address identifying each node in an internet. Internet addresses are
used to route packets through the network. Currently, there are two versions used for internet
addressing: Internet Protocol version 4 (IPv4) and Internet Protocol version 6
(IPv6). Mapping relates internet addresses to physical hardware addresses in the network. For
example, in IPv4, the Address Resolution Protocol (ARP) is used to map internet addresses to
Token-Ring or Ethernet physical hardware addresses. In IPv6, Internet Control Message Protocol
Version 6 (ICMPv6) is used to map internet addresses to physical hardware addresses.
A network is the combination of two or more nodes and the connecting branches among them.
A physical network is the hardware that makes up a network. A logical network is the abstract
organization overlaid on one or more physical networks. An internet is an example of a logical
network.
Packet refers to the unit or block of data of one transaction between a host and its network. A
packet usually contains a network header, at least one high-level protocol header, and data blocks.
Generally, the format of the data blocks does not affect how packets are handled. Packets are the
exchange medium used at the internetwork layer to send and receive data through the network.
A port is an end point for communication between applications, generally referring to a logical
connection. A port provides queues for sending and receiving data. Each port has a port number for
identification. When the port number is combined with an internet address, a socket address
results.
Protocol refers to a set of rules for achieving communication on a network.
Class Task
1. Briefly describe the following terms: (i) Client (ii) Datagram (iii) Internet Address (iv) Host
Ticket-Out
1. Mention five things you can do on the internet.
2. State 5 characteristics of the internet.
SUBJECT: ICT
WEEK TWO
DURATION: 45 MINUTES
TOPIC: INTERNET BROWSERS
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Define the web browser.
b) Give examples of web browsers
c) Explain in full or part, how surfing the internet is made possible.
CONTENT
WEB BROWSER
A web browser is a software program that allows you to access and view web pages. The web
browser software is built on the hyperlinks, which allows users to point and click with a mouse in
order to jump from one document to another in whatever order they are desire.
Origin of Web Browsers
In January 1993, the first browser, viola and Midas were released for the X window system (UNIX).
At the same time, a Macintosh browser was released called ALPHA version.
In February 1993, the first popular graphical World Wide Web browser was NCSA Mosaic. It was
released for all common platforms (UNIX, windows and Macintosh) in September 1993.
Marc Andersen, the mastermind of mosaic, founded his own company, Mosaic communication
corp., now known as Netscape and released a browser, the Netscape navigator 1.0. He soon
controlled 70 percent of the browser market. Microsoft saw this gigantic success and soon released
a browser called MS internet explorer, for free, now new version of both browser support most
HTML.
Examples of Web Browser
1. MICROSOFT INTERNET EXPLORER: Microsoft internet explorer is the most widely used by
people around the world. It was developed by Microsoft in 1995 as a supportive package to
the Microsoft windows operating system.
2. MOZILLA FIREFOX: Mozilla fire fox is the second browser after the internet explorer. It can
be used on many different operating systems including windows, Macintosh, OS/2 and
UNIX. It is one of the first browsers to incorporate features such as tabbed browsing that
allows user to open multiple sites in a single window.
3. OPERA: Opera is a web browser that was developed by Opera software in 1996. It is a well-
known browser that is mainly used in activated mobile phone and smart phones. It is used
with many operating systems like Linux, MAC OS and MS window. It has a built-in features
such as ad-blocker, VPN, and battery saver mode. It is also highly customizable.
4. NETSCAPE NAVIGATOR: Netscape navigator was developed by Netscape Communication
Corporation and was very popular in the 1990s. It was compatible with almost every
operating system
5. GOOGLE CHROME: Chrome is the most popular web browser today. It is fast and easy to
use, it has a minimal design. It has a vast library of extensions and is considered the most
secure web browser today.
6. APPLE SAFARI: Safari is the default web browser for Apple devices such as Macs, iPhones
and iPads. It is fast and functional, and has a user-friendly interface. There is a built-in
feature that helps protect users’ privacy while surfing the web.
7. MICROSOFT EDGE: Edge is Microsoft’s latest web browser that replaced the Internet
Explorer. It is fast, streamlined, and has a clean design. One of its defining feature is its
integration with Microsoft’s digital assistant, Cortana.
8. BRAVE: Brave is a privacy-focused web browser that blocks all trackers, ads, and scripts by
default. It is also faster than most web browsers because it removes unnecessary codes
from websites.
9. TOR BROWSER: Tor is a highly secure web browser that uses a network of servers to hide a
user’s identity and browsing activity. It is popular among users who want to browse the web
anonymously.
10. MAXTHON: Maxthon is a cloud-based browser that allows users to take notes and capture
screenshots directly from it. It is fast and secure.
Class Task
1. Define the web browser.
2. List 4 examples of web browsers.
3. What is (a) Server (b) Client (c) Router
Ticket-Out
1. Define the following: (a) Home Page (b) website (c) hypertext link (d) IP Address
SUBJECT: ICT
WEEK THREE
DURATION: 45 MINUTES
TOPIC: BENEFITS OF THE INTERNET
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) State the benefits of the internet
CONTENT
The benefits of the internet are as follows:
1. INFORMATION: The internet gives you access to information on any subjects of your
interest. This makes the internet a valuable research tool. Most sources such as newspaper
and magazines have websites and a number of them only exist online.
2. RESEARCH: You can make use of the internet search facilities to research just about any
topic you can think of. This information can help you with a school project, or a presentation
at work. You can search for the data you need, or go to specific research sites.
3. E-MAIL (electronic mail): Electronic mails enable us to exchange message with people
around the world, including friends, family members, colleagues, customers and even
people you meet on the internet. E-mail is an exciting feature of the internet as we can send
and receive message over long distances. It is also fast, easy and inexpensive.
4. ENTERTAINMENT: The internet offer many different forms of entertainment, such as radio
and television broadcast, video and music. You can find picture from the latest film, watch
live interview of your favorite celebrities and listen to music before it is available in stores.
5. PROGRAM: You can find thousands of programs that can be used on your computer, such
as word processors, drawing programs, games and accounting programs.
6. ONLINE SHOPPING: You can order for products on the internet, while sitting at home. You
can purchase items such as books, flowers, music, CDs, pizzas, stock and used cars.
7. CHATTING: Chat features allow you to exchange typed message with another person on the
internet. The message you send will instantly appear on the other person’s computer. You
can chat with a person or a group at the same time.
8. BANKING: You can use the internet to find financial sites that enables you to do your
banking and investing online. Banking online is much more convenient and much less time
consuming than doing it in person. Online banking is extremely secure because all modern
browsers support robust security protocol which ensures that your financial data remains
safe.
9. E-LEARNING: E-learning is a training or education program by electronic means. E-learning
involves the use of computer or an electronic device (GSM handset) to provide training on
educational technology as a tool for learning. Distant education can be done by e-learning.
Class Task
1. Briefly explain three internet abuse
2. As a student, what are the benefits of the internet to you?
Ticket-Out
1. What is internet?
2. List the benefit of the internet.
3. Mention ways abusing the internet.
SUBJECT: ICT
WEEK FOUR
DURATION: 45 MINUTES
TOPIC: E-MAIL
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Understand the concept of the e-mail
2. State the types and uses of emails we have
CONTENT
E-mails or electronic mails refer to electronically transmitted messages that are sent and
received via the internet. They are a convenient method of communication that allows
individuals and organizations to communicate across distances. Although there are several
email service providers, some of the most popular email services include Gmail, Yahoo Mail,
Outlook, and ProtonMail, among others.
To use an email service, users need to be registered to any of the popular email service
providers. This registration is done by signing up on their platform. After a successful sign-up,
users can now send and receive mails. All send and receive actions is done through the users
email address. An example of an email address is [email protected]. This email address is
protected with a password (which should always be kept private) and other security features.
Types of Emails
1. Personal Emails: These are emails that individuals send to each other for personal
communication, such as keeping in touch with friends, family, and loved ones.
2. Business Emails: These are emails used for communication within an organization or for
professional purposes, such as exchanging information with colleagues or
communicating with clients or customers.
3. Marketing Emails: These are emails sent by businesses to promote their products or
services.
Uses of Emails
1. Communication: E-mails allow individuals and organizations to communicate quickly and
efficiently.
2. Storage: Emails can be used to store important messages, documents, and files.
3. Coordination: Emails can be used to coordinate business meetings, events, and other
activities.
In conclusion, emails offer a convenient and efficient way of communicating, and they come in
different types, including personal emails, business emails, and marketing emails. However, it is
important to be cautious about email security and possible abuse.
Ticket-Out
1. What is an email??
2. List the uses of the emails.
SUBJECT: ICT
WEEK FIVE
DURATION: 45 MINUTES
TOPIC: SEARCH ENGINES AND THEIR USES
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
Understand the basic concept of computer programming language.
CONTENT
Search engines are a powerful tool that helps us find information on the internet. These search
engines use complex algorithms to search and index millions of web pages and return relevant
results based on the user's search query.
In conclusion, search engines are an essential tool in finding information on the internet. With
their ability to search and index millions of web pages, they make it easier and more convenient
for people to find information, shop, stay informed, and be entertained.
Class Task
1. What are the types of search engines?
2. Give 2 uses of search engine.
SUBJECT: ICT
WEEK SIX
DURATION: 45 MINUTES
TOPIC: NETWORK GROUPS
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Explain what computer network means
b) State the major types of computer networks
c) Explain network topology and the types
CONTENT
Computer Network
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams. A network is defined as a group of two or more computer systems linked together.
Computer networks allow you to share information with friends, family, coworkers and
customers. Network file sharing is the process of copying data files from one computer to another
using a live network connection.
Before the Internet and home networks became popular, data files were often shared using floppy
disks. Nowadays, some people still use CD-ROM / DVD-ROM disks and USB sticks for transferring
their photos and videos, but networks give you more flexible options.
Types of Network
In this lesson, we would be looking at 4 major types of networks. They are:
1. Personal Area Network – The smallest and most basic type of network, a PAN is made up of
a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around
one person in one building. These types of networks are typically found in small offices or
residences, and are managed by one person or organization from a single device. Often
used at home, this network is more on connections between a computer and another
gadget such as a telephone or a modem.
2. Local Area Network – A connection that’s used for groups of computers. This is common in
small offices and internet cafes. This is where everyone can share files basically, and is also
known to be a good way to connect between computers whenever they want to share an
internet connection, or whenever they want to play games with each other.
3. Metropolitan Area Network – A more powerful version of the local area network where it
can cover up the whole city in terms of connection. A huge server is usually used for this
type of connection.
4. Wide Area Network – This is a common type of network nowadays that’s made possible by
wireless technology. As the term implies, a WAN spans a large physical distance. The
Internet is the largest WAN, spanning the Earth. Usually, a credential or service from a
certain company is needed to enter a connection in this type of network, but there are
others that can be used for free. This is good for internet connection. The internet is a well-
known version of this one. A WAN is a geographically-dispersed collection of LANs. A
network device called a router connects LANs to a WAN. In IP networking, the router
maintains both a LAN address and a WAN address.
Class Task
1. Where can the LAN be applied?
2. State 2 uses of the wireless network.
Ticket-Out
1. List and explain in your own understanding, the four major types of networks
2. Name three types of Network topology
SUBJECT: ICT
WEEK SEVEN
DURATION: 45 MINUTES
TOPIC: FILE SHARING
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
a) Define file sharing
b) State the various methods of file sharing we have.
CONTENT
File sharing
File sharing is the practice of sharing or offering access to digital information or resources,
including documents, multimedia (audio/video), graphics, computer programs, images and e-
books. It is the private or public distribution of data or resources in a network with different levels
of sharing privileges.
File sharing can be done using several methods. The most common techniques for file storage,
distribution and transmission include the following:
1. Removable storage devices
2. Centralized file hosting server installations on networks
3. World Wide Web-oriented hyperlinked documents
4. Distributed peer-to-peer networks
SUBJECT: ICT
WEEK EIGHT
DURATION: 45 MINUTES
TOPIC: DIGITAL DIVIDE
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Describe the concept of and define digital divide
2. Identify how the digital divide can be bridged.
3. Expatiate on the old and new economy.
CONTENT
The present age is referred to as the digital age. It is called a digital age because the current
global economy is driven by a digital device known as the computer. The computer represents
data and instructions in 0s and 1s called binary codes, hence, it is known as a digital device. One
of the reasons for inventing the computer is to reduce the world to a global village. To achieve
this, everyone must have access to a computer (mobile phone, laptop, etc.) and internet
connectivity. But this is not the case. Some classes of people have effective access and coverage
to information and communication technologies and others have little or no access at all.
Hence, there is a digital gap or split between these two groups of people. This gap or split is
called Digital Divide
Class Task
1. Define digital divide.
2. State 2 characteristics of the old and new economy.
Ticket-Out
1. What were some of the limitations of the old economy as compare to the new
economy?
2. State 4 benefits of the new economy.
3. Explain how the digital divide can be bridged.
SUBJECT: ICT
WEEK NINE
DURATION: 45 MINUTES
TOPIC: DIGITAL LITERACY
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, VIDEO & PICTURE
MATERIALS
Objectives: at the end of the lesson, learners should be able to:
1. Understand what digital literacy means.
2. State the types of digital literacy that exists.
3. Give characteristics of digital literacy.
CONTENT
Meaning of Digital Literacy
Digital Literacy is the ability of individual to use digital technology tools to access, manage,
integrate, analyze and evaluate information and communicate with others in order to
participate effectively in society”.
Digital literacy encompasses computer hardware, software, the Internet, cell phones, PDAs, and
other digital devices. A person using these skills to interact with society may be called a digital
citizen.
DIGITAL CITIZENSHIP
Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard
to technology use.
4. Digital literacy: process of teaching and learning about technology and the use of
technology.
8. Digital health and wellness: physical and psychological well-being in a digital technology
world.
1. Photo-visual literacy: This is the ability to read and deduce information from visuals.
2. Reproduction literacy: This is the ability to use digital technology to create a new piece
of work or combine existing pieces of work together to make it your own.
3. Branching literacy: This is the ability to successfully navigate in the non-linear medium of
digital space.
4. Information literacy: This is the ability to search, locate, assess and critically evaluate
information found on the web.
5. Socio-emotional literacy: This refers to the social and emotional aspects of being
present online, whether it may be through socializing, and collaborating, or simply
consuming content.
6. Media literacy: This involves the interpretation and production of shared meanings, and
the ability to access, analyze, evaluate and create messages across a variety of contexts.
Schools are updating their curriculum for digital literacy to keep up with accelerating
technological developments. This often includes computers in the classroom, the use of
educational software to teach curriculum, and course materials being made available to
students online. Some classrooms are designed to use smart boards and audience response
systems. These techniques are most effective when the teacher is digitally literate as well.
Teachers often teach digital literacy skills to students who use computers for research. Such
skills include verifying credible sources online and how-to cite web sites. Google and Wikipedia
are used by students "for everyday life research. Educators are often required to be certified in
digital literacy to teach certain software and, more prevalently, to prevent plagiarism amongst
students.
Many jobs require a working knowledge of computers and the Internet to perform basic
functions. As wireless technology improves, more jobs require proficiency with cell phones and
PDAs (sometimes combined into smart phones).
Some jobs are increasingly performed primarily on computers and portable devices. Many of
these jobs require proof of digital literacy to be hired or promoted. Sometimes companies will
administer their own tests to employees, or official certification will be required.
Manufacturers and retailers, for example, are expected to collect and analyze data about
productivity and market trends to stay competitive. Construction workers often use computers
to increase employee safety. Job recruiters often use employment Web sites to find potential
employees, thus magnifying the importance of digital literacy in securing a job.
Class Task
1. What is digital literacy?
2. What are 2 characteristics of digital literacy?
3. State 3 types of digital literacy we have.
Ticket-Out
1. Define digital citizenship
2. State 5 areas of digital citizenship