0% found this document useful (0 votes)
25 views12 pages

Basic 8 2ND Term Comp STD

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views12 pages

Basic 8 2ND Term Comp STD

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

NAME:……………………………………………………………………………….CLASS:………………………………………..

DEEPER LIFE HIGH SCHOOL

2ND TERM: E-LEARNING NOTES

SUBJECT: COMPUTER STUDIES

JS 2 (BASIC 8)

SCHEME OF WORK

WEEK TOPIC

1. Revision of last term’s work.


2. Computer Ethics (a) Responsible use of computer and internet
3. Computer Ethics (b) Abuse or Misuse Computer and internet.
4. Safety Measures (a) Meaning (b) Safety Measures
5. Graphic Package
6. Graphic Package
7. Graphic Package
8. Paint Environment
9-10 Revision
11-13 Examination
WEEK 2

DATE…………………………………..
TOPIC: COMPUTER ETHICS
CONTENTS
1. Meaning of Computer Ethics
2. Responsible use of the computer
3. Areas of misuse of computers
INTRODUCTION
The rate of advancement in technology has continued to have greater impact and influence in
every areas of human endeavour which poses a great threat to security of information,
intellectual Property right, privacy concerns, artificial intelligence, human communication, and
the society, creating a drastic fall in ethical standards which is a bone of contention. Hence,
the need to address these using ethical standards cannot be over-emphasized.

SUB-TOPIC 1: MEANING OF COMPUTER ETHICS

Computer Ethics refers to the set of moral principles that governs and regulate the behaviours
of a group or individual on the acceptable use of computer.

RESPONSIBLE USE OF COMPUTERS


This refers to the proper etiquettes and attitudinal posture to display while handling or using a
computer system to ensure maximum performance, confidentiality and respect for other
people’s right. Hence, the following under listed rules must be adhere to and maintained;
1. Avoid dropping food or liquids on the system.
2. Avoid accessing restricted files on another person’s system
3. Refrain from displaying or using offensive pictures as desktop background.
4. Avoid cramming and typing of other people’s password and username instead look
away.
5. Cover the computer and all peripherals with dust covers when not in use.
6. The system should be protected from power surges by using either a voltage stabilizer
or a surge protector.
7. In places where power outages are common, the system should be connected to an
uninterruptible power supply unit (UPS) to protect the system from shutting down
abruptly and avoid damage to the computer’s memory.
8. The system should be unplugged from the power source when it is not going to be used
for a long time.
Responsible use of the Internet
1. Check your e-mail regularly.
2. Answer mail promptly and politely
3. The subject of e-mails should be short, meaningful and truthful.
4. Write or type thoughtfully because the internet is a public medium and content of any
e-mail may end up in unexpected places.
5. Check your spellings against errors of omission and commission.
6. Avoid visiting website with polluted content; a lot of innocent looking sites contain
pornographic and other offensive materials.
7. Do not open file attachments from unknown sources, they can contain Viruses.
8. Take caution in giving your personal information or details to anyone you meet on the
internet.
9. Avoid typing or replying a mail quickly on the internet when you are angry because it
could trigger what is called “FLAME”.
10.Avoid typing a mail using capital letters because is equivalent to SHOUTING!

EVALUATION

I. Define the term Computer ethics


II. Itemize 5 responsible use of computer
III. State 5 abuse or mis-use of internet

WEEK 3
DATE…………………………………..
TOPIC: COMPUTER ETHICS
SUB TOPIC: MISUSE OF COMPUTER AND INTERNET
CONTENTS
1. Misuse of computer and the internet

INTRODUCTION

The needs to protect and keep data or information save from loss, damage or mis-use it’s of
utmost importance. Here are some several ways in which people misuse computers and the
internet, namely:

SUB-TOPIC 2: MISUSE/ABUSE OF COMPUTER AND THE INTERNET

1. INVASION OF PRIVACY/HACKING: This is an illegal access gained by an unauthorized


person or someone into confidential files, documents and computer programs without
permission. Such unauthorized access is known as hacking. Hackers can also access
computers to collect private information about individuals or delete important
information.
2. COMPUTER VIRUS: These are programs deliberately written to damage data by copying
or replicating itself. People can introduce a virus into a computer system or network via
fictitious e-mails, infected diskettes e.t.c without one’s knowledge.
3. FRAUD: False data and information are sent through e-mails and mailings lists to
fraudulently collect money and other items from unsuspecting victims.
4. PORNOGRAPHY: This is the explicit representation of human body or sexual activity on
the internet by unscrupulous people to promote and distribute pornographic materials.
5. PIRACY: Many people use CD or DVD writers in computers to make illegal copies of
software and other materials such as software, music, films, etc.
6. PLAGIARISM: This is the act of copying another person’s intellectual work such as a
book, music, etc and presenting it as one’s own without giving credit to the real owner
of the idea. This has been made easy by computers and access to the internet.
7. SPAM or JUNKS: This involves sending of unwanted provocative messages containing
disturbing images and messages to people’s mail which they do not request for. A spam
filter could be installed to minimize such occurrence.
8. CYBER WAR: This is a form of war that happens on computers and the internet done
purposely using cyber war drills and games to prepare for genuine attack from their
enemies.

EVALUATION:

1. Mention and explain 5 ways to use computers and the internet responsibly.
2. Mention and explain 5 ways in which computers and the internet can be misused.
READING ASSIGNMENT: Students are to read more on Computer Ethics from their textbook
WEEK 4

DATE…………………………………..
TOPIC: SAFETY MEASURES

CONTENT:

 Meaning of Safety
 Safety measure tips

SUB-TOPIC 1: SAFETY MEASURES

INTRODUCTION

Accident is an undesirable, unwanted and unpleasant occurrence that happens to man


unexpectedly causing injury the person, damage to equipment and environment. It is such a
common phenomenon and inevitable in a working environment, hence, there is need to
proactively ensure and observe simple safety measures or rules.

Definition of Safety

Safety is a proactive step or measure taken to prevent or against an unforeseen event,


unpleasant and undesirable occurrence.

SAFETY MEASURES

When using computers, safety measures must be taken to protect both the computer system
and the People that are using it, by doing this; the computer’s life span can be prolonged.

The following points summaries the safety measures every computer user is expected to take
in the Process of using the computer systems:

1. Good sitting habit must be exercised.

2. Using antiglare protection should be recommended.

3. Monitor base must be positioned correctly.

4. Dust free environment must be maintained.


5. Keep liquid away from the computer. Students are not expected to eat or drink beside
the computer.

6. A computer room must be adequately illuminated.

7. A computer laboratory or where computer is placed should be well ventilated. This can
be done by using air conditioner to keep the surrounding cool.

EVALUATION:

State four measures that need to be taken when using a computer


WEEK 5 Date: __________

TOPIC: Graphic Packages 1:

CONTENT:
(a) Meaning of graphic package
(b) Examples of graphic package: paint, Corel Draw, Instant Artist, Harvard graphics, Photo
shops, log graphic etc
(c) Features of graphic packages: Tool bar, Menu bar, Printable area, Colour Palette. etc.

Meaning of graphic package


A package is software written to perform a particular task. A graphics use lines, shapes, colours
and patterns to show information. Apart from being able to draw lines and other geometric
shapes, it is also possible to do full art works and painting in full colours of any kind of objects.
Graphic images can be created using computers.

Examples of Graphic Packages


All these can be produced with art illustration graphic software. They are:
i. Paint
ii. Corel Draw
iii. Instant Artist
iv. Harvard graphics
v. Photo shops
vi. Logo graphics

Corel Draw
This can be defined as a high-quality graphic designed and developed for automating artistic
functions. Corel draw was developed by Corel Corporation founded in June 1985. This
corporation has a network of over 100 distributors in more than 40 countries.

Corel Draw Version


There are many versions of Corel Draw ranges from Corel 5, 6, 7, 8, 9, 10, 11, 12, 14, 15 and
16. The uses of all the versions are similar only with little modifications and improvement to
the advantage of the user. However, the teaching will be based on Corel Draw 11 versions.

Loading Corel Draw 11


 Click start in the task bar
 Click all programs
 Click Corel graphic suite 11
 Click CorelDRAW 11
OR
Double click Corel Draw ICON

EVALUATION
1. What is a graphic package?
2. List 5 examples of graphic package.
3. Write the steps involved in loading graphic package.
WEEK 6 & 7 Date: __________

Sub-topic 2: The Features of Graphic package

1. Title Bar: It displays application name and file name at the top of the package.
2. Menu Bar: It displays the various command use to work on the program.
3. Page Layout: This is a workspace for user’s work. It is otherwise known as printable
page.
4. Standard Tool Bar: This bar contains icon and commands for performing operations on
documents.
5. Status Bar: It displays detailed information about programs selected.
6. Ruler: This is used for measuring objects in order to obtain accurate size. There are two
types: horizontal and vertical.
7. Properties Bar: It displays detailed information about graphic/text selected.
8. Scroll Bar: They are used for scrolling page layout/work in the desired direction
(Horizontal and Vertical)
9. Colour Palette: It displays various colours used for colouring any selected object/text.
10. Tool Box: This contains the tools used to create, fill, and modify your drawing.

Evaluation
Highlight seven features of a graphic package

Weekend Assignment
Design the following:
i. letter head paper of your school
ii. Student ID card.
WEEK 8 Date: __________

Topic: Graphic Packages II: The Paint

CONTENT: (i) The Paint Environment - identification of features of the paint environment.
(ii) Paint tools and their functions.

The Paint Environment


Paint is a program you can use to create drawings on a blank canvas or top of other pictures.
The program features a tool bar on the left side of the window.

Loading Paint
 Click on the start icon in the button in the bottom left corner of the screen.
 Click the programs option.
 Click on Accessories to see sub menus.
 Click on the paint environment.

Features of Paint Environment


1. Title bar
2. Tool box
3. Workspace
4. Restore Button
5. Minimize Button
6. Close Button
Sub-Topic 2: Using the tools
Find the tool bar on the screen. The icons on this bar stand for the different things you can do.
The small pictures on the toolbar are called icons. Icon is a graphical representation of a
symbol.

EVALUATION
1. What is the purpose of the paint program?
2. Write the steps to start paint.
3. What are the tools listed below used for?
a. line tool b. Brush c. Curve tool d. Text tool e. Rectangle tool f. Fill with colour tool.

You might also like