0% found this document useful (0 votes)
2K views19 pages

1st Term JSS 3 Note 2020

Uploaded by

dadaoluwasegunv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views19 pages

1st Term JSS 3 Note 2020

Uploaded by

dadaoluwasegunv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

J.S.S.

3 1ST TERM
WEEKS TOPIC CONTENT
1. Revision Revision of JSS2 work
2. Computer Career 1. Computer Professionals
Opportunity - Computer Manager
- System Analyst
- Programmers
- Computer Educator
- Computer engineers and technicians
- Operators
2. Qualities of good computer professionals
1. Computer Professional bodies
i. Nigerian Computer Society (NCS)
ii. Institute of Management Information System (IMIS)
iii. Computer Professional Registration Council of Nigeria
(CPRN)
iv. Information Technology Association of Nigeria (ITAN)
v. Nigerian Internet Group (NIG)
2. Functions and duties of each of the computer professional
bodies and association.
3 Intro to IT Ess 6.0 Introduction to Personal Computer I
4. Computer Viruses 1. Meaning
2. Types of Computer Virus
- Boot sector
- Executable file virus
- Attack on documents
3. Example of viruses: Trojan horse, sleeper, logic bomb,
Alabama virus, Christmas virus
4. Sources of viruses
- Infected diskettes
- Infected CD-ROMS
- Internet Downloads
- Illegal duplication
- E-mails
1. Virus warning signs:
- Slowing down of response time
- Presence of tiny dots
- Wandering across the screen
- Incomplete saving of file
- Corruption of the system setup instructions
- Appearance of strange characters
2. Virus detection (Antivirus):
- Norton Antivirus
- McAfee Virus scan
- Dr. Solomon’s tool kit, etc.
5 Intro to IT Ess 6.0 Introduction to Personal Computer II
6. Practical Loading and running an antivirus software on a computer system.
7. Continuous Assessment Continuous Assessment and Mid-Term break
8. Internet 1. Definition of search engines
2. Examples of search engines
- www.google.com
- www.mama.com
- www.ask.com
3. Uses of search engines
9. CISCO Hands on Skill
10. Revision
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 21st – 25th September, 2020
Term: 1st
Week: One
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 11years
Duration: 60 minutes per week
Topic: COMPUTER CAREER OPPORTUNITY
Sub Topic: Computer Professionals
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
a. Who is a computer operator?
b. List all the computer professional you know.
c. Make a chart of computer professionals.
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
1st Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.

CONTENT
1st Period
COMPUTER CAREER OPPORTUNITY
COMPUTER PROFESSIONAL
(a) Computer Professionals:
Computer personnel embrace those personnel who involve in assemble, install, maintain, repair and operate
the computer system. The term equally includes the programmer. The computer personnel know the rules
and regulations guiding the computer usage.

Administrative structure of computer professionals

Computer Manager

System Analyst System Engineer Computer Educator

Programmer

Computer Operator

The administrative structure varies from one organization to another depending on the management of the
organization. However, the structure is somehow similar.

Computer Manager:
He heads the computer department; he oversees the entire day to day running of the computer department.
System Analyst
A system analyst carries out feasibility study on a system. He is the person who thinks of likely problems
that may arise from the system and application software and he proffers solution.

System Engineer
Is in control of all installation of hardware and software of the computer system. He is in charge of
servicing, repairs and general maintenance of the system.

Programmer
Is the person who writes computer programmes according to the specification written by the system analyst.

Computer Educator
A computer educator trains up user to have knowledge of computer hardware and software.

Computer Operator
Is the person who operates the computer.

Qualities of Good Computer Professionals


A good computer professional must possess the following qualities.

i. Excellent Analytical Skills: Computer professional’s must


have excellent analytical skills that can be applied to solve problems or develop new ideas.
ii. An attention to detail: Computer personnel must pay attention to detail to ensure everything works
correctly and efficiently because any slighted mistake can affect how a web page looks or how a program
will run.
iii. A commitment to learning: Technology is constantly changing it is dynamic and those who keep
abreast the latest trend in information technology are the ones who will be the most successful.
iv. Good communication skills: Communication skills are important to those working in information
technology because understanding a client’s needs and apply a solution depend heavily on a steady stream of
open communication.
v. An interest for maths: Strong likeness for maths is essential because knowledge of maths is used in
many computers application e.g. programming.
vi. The ability to learn and memorise programming language: Computer professionals must know many
programming language and how to use a wide variety of computer software programs.
vii. The ability to handle multitasking: A good professional must possess the ability to perform many
tasks at once and must be able to manage all his responsibilities simultaneously. Time management is highly
essential.
viii. Solve problem, solving/trouble shooting capabilities: Computer professionals should be able to
solve problems with network, software and other programs. They are expected to solve those problems very
quickly and possess sharp trouble shooting and skills.
ix. Technical writing skills: A good computer professional must possess a technical writing skill.

Evaluation:
1. List five (5) qualities of good computer professionals and explain three (3)
2. Make a chart of computer professionals.

Reading Assignment
Read the following computer professional bodies: NCS, IMIS, CPRN, ITAN, NIG.

Weekend Assignment
1. ____ heads the computer department and she/he oversees the entire day to day running of the
computer department. (a) Computer Educator (b) Computer Manager (c) System analyst
(d) Computer Operator
2. __ carries out feasibility study on a system. (a) Computer Manager (b) System analyst
(c) Computer Manager (d) System engineer
3. The person that operates(s) the computer is called _____ (a) Teacher (b) Engineer (c) Operator
(d) Analyst
4. ___ is the person who writes computer programmes based on the specification written down by the
system analyst. (a) System engineer (b) Operator (c) Programmer (d) Teacher
5. ___ installs hardware and software of the computer system as well as servicing, and maintaining the
system. (a) Computer Manager (b) System engineer (c) Operator (d) Educator
6. A good computer professional must possess the following qualities except. (a) Excellent
analytical skills (b) Attention to detail (c) Good communication skills (d) None of the above

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 28th – 2nd September, 2020
Term: 1st
Week: Two
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: COMPUTER CAREER OPPORTUNITY
Sub Topic: Computer Professional Bodies
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
1. What is the full meaning of the following: NCS, IMIS, CPRN, ITAN
2. List and explain the functions of NCS.
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
COMPUTER CAREER OPPORTUNITY
COMPUTER PROFESSIONAL BODIES
1. Nigerian Computer Society (NCS)
2. Institute of Management Information System (IMIS)
3. Computer Professional Registration Council of Nigeria (CPRN)
4. Information Technology Association of Nigeria (ITAN)
5. Nigerian Internet Group (NIG)
NIGERIAN COMPUTER SOCIETY (NCS)
Nigerian Computer Society is a place where people interested in computing Technology within Nigeria
gather to share ideas and knowledge. You can become a member by completing the form below on line and
supply them with the following information:
First Name, Last Name, e-mail, Change password and Register me.
Functions of NCS
i. To promote the education and training of computer and information scientist, computer engineers,
information architects and information technology and system professionals.
ii. To actively encourage research in the advancement of computer and information sciences.
iii. To promote the inter change of information about the science and arts of information processing.
iv. To promote and protect the professional interest of the members.
v. To work for the recognition by government of the ‘Digital Divide’ and to collaborate with relevant
government.
INSTITUTE OF MANAGEMENT INFORMATION SYSTEM (IMIS)
The Institute of Management Information System is the teaching independent professional association for
both users and developers of today’s information technologies.

VISION/FUNCTIONS OF IMIS
The IMIS is to see information system management recognized as one of the key professionals’ influencing
the future of our world.
Mission is to further the cause of professionals in the cause of professionalism in the use of information
system through Life-long learning and to increase the awareness by the public as an individual or as an
organization of the advances, implication and potential in information system.

INFORMATION TECHNOLOGY ASSOCIATION OF NIGERIA (ITAN)


Functions
1. The ITAN provides learning opportunities within the engineering science research and broadly
technology.
2. The goal of the ITAN education programs is to ensure the growth of skill and knowledge among the
technician profession and to foster individual commitment to continuing education among ITAN members,
the engineering and scientific community and the general public.
COMPUTER PROFESSIONAL REGISTRATION COUNCIL OF NIGERIA (CPRN)
Computer Professional Registration Council of Nigeria is a corporate entity charged with the control and
supervision of computing profession in the country. The computer professionals were established through
Act No. 49 of 1993 promulgated on June 10 and gazette on August 9.

FUNCTIONS OF CPRN
1. The body is charged with the responsibility of determining the standard of knowledge and skills to be
attained by persons seeking to become members of the profession and improve those standards from time to
time as circumstance may permit.
2. It is also part of the responsibility of CPRN to maintain a register or persons seeking to be registered
under the Act to practice computing profession and the publication from time to time of the list of such (it is
illegal for anybody to practice Information Technology in Nigeria without registering with computer
professionals.)
3. They conduct exams as Computer Professional Examinations to other professionals that are
interested in building career in Information Technology (IT). Upon completion of the exams, the person
would be registered under a full member category.

NIGERIAN INTERNET GROUP (NIG)


It is the largest online community of youth interested in global issues and creating positive changes.
The Nigerian Internet Group is a non-governmental, nonprofit making organization with the primary
objectives of promoting access to the internet.
FUNCTIONS OF NIG
The Nigerian Internet Group intends to reserve the trend whereby Nigeria ((despite her last human and
material resources) lags behind much of the world in terms of access to the global information infrastructure
which is vital to attracting new investment and enhancing global competitiveness.
Evaluation:
1. What is the full meaning of the following: NCS, IMIS, CPRN, ITAN, NIG.
2. List and explain the functions of NCS.

Reading Assignment
Read from your text book the topic ‘computer viruses’.
Weekend Assignment
1. ___ is a place where people interested in computing Technology within Nigeria gather to share rank
and knowledge. (a) Nigeria Computer Society (b) ITAN (c) IMIS (s) None of the above

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 28th September – 2nd October, 2020
Term: 1st
Week: Three
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: CISCO INTRO TO IT ESS 6.0
Sub Topic: Introduction to Personal Computer
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
a. Explain how to keep personal computer components safe.
b. Explain the features and functions of computer components
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
INTRODUCTION TO PERSONAL COMPUTER
The case houses the internal components such as the power supply, motherboard, central processing unit
(CPU), memory, disk drives, and assorted adapter cards.
The term form factor refers to the physical design and look of a case. Common desktop computers are
available in form factors including:
COMPUTER CASING
 Horizontal case
 Full-Size Tower
 Compact Tower
 All-in-one
Many case manufacturers may have their own naming conventions, including super tower, full tower, mid
tower, mini tower, cube case, and more.

SYSTEM POWER SUPPLY


Computers use a power supply to convert AC power into a lower voltage DC power required by internal
components.
Desktop computer power supply form factors include:
• Advanced Technology (AT) – original power supply for legacy computer
systems
• AT Extended (ATX) – updated version of the AT
• ATX12V – the most common power supply on the market today
• EPS12V – originally designed for network servers but is now commonly used in high-end desktop
models.
CONNECTORS
 A power supply includes several different connectors. They are used to power various internal
components such as the motherboard and disk drives.
 Some examples are:
• 20-pin or 24-pin slotted connector
• SATA keyed connector
• Molex keyed connector
• Berg keyed connector
• 4-pin to 8-pin auxiliary power connector
• 6/8-pin PCIe power connector
THE MOTHERBOARD
 The motherboard is the backbone of the computer.
 It is a printed circuit board (PCB) that contains buses, or electrical
pathways, that interconnect electronic components.
 These components may be soldered directly to the motherboard, or added using sockets, expansion
slots, and ports.
THE CPU
 The central processing unit (CPU) is responsible for interpreting and executing commands.
 The CPU is a small microchip that resides within a CPU package.
 The CPU socket is the connection between the motherboard and the processor.
 Modern CPU sockets and processor packages are built in following architectures:
 Pin Grid Array (PGA) - the pins are on the underside of the processor package and is inserted into the
motherboard CPU socket.
 Land Grid Array (LGA) - the pins are in the socket instead of on the processor.
COMPUTER MEMORY
 A computer might use different types of memory chips.
 All memory chips store data in the form of bytes.
 A byte is a block of eight bits stored as either 0 or 1 in the memory chip.
 Read-Only Memory (ROM) – such as ROM chip.
 Random Access Memory (RAM) is the temporary working
storage for data and programs that are being accessed by the CPU.
RAM is volatile memory.
 Adding more RAM in a computer enhances the system performance. However, the maximum amount of
RAM that can be installed is limited by the motherboard.

EVALUATION:
What kind of personal computer do they have?
What are the differences between a desktop PC and a laptop?
ASSIGNMENT
What are the hardware components in their desktop PC or laptop?
What is the specification of those components?
How do specifications affect the performance or functions of the PC or laptop?
What are new input/output devices that they would like to have? Why?

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 5th – 9th October, 2020
Term: 1st
Week: Four
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: CISCO INTRO TO IT ESS 6.0
Sub Topic: Introduction to Personal Computer
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
1. Explain the three ways in which computer virus can infect your computer.
2. What is computer virus?
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
COMPUTER VIRUS
(a) Meaning
Computer virus is a program intentionally written by some software developer to cause damage to the
computer, programs and files in which it found itself. The computer virus may be designed to display
unwanted message
The computer virus is a program that has the ability to replicates itself by changing other programs to
include a copy of itself. A virus causes the infected computer system to function in way not originally
planned. The computer virus cannot be seen with your natural eyes yet the effects can be notified on an
infected system.

(b) Types of Computer Virus


There are basically three ways in which a virus will infect your micro computer.
i. Boot sector
ii. Executable file virus
iii. Document

BOOT SECTOR: Boot sector infect hard drives and flash disks by making itself available on the boot
sector of the disk. Booting up from an infected flash disk can cause damage to the hard drive.

EXECUTABLE FILE VIRUS: They spread the infection by attacking the code to executable files
(EXE.COM) in this way; the virus program will be executable before the host program is executed.
DOCUMENT VIRUS: Virus can affect the document by moving from disk partition table to a different
sector and replace it with its own code, therefore infecting document as they are accessed.

Evaluation:
1. Explain the three ways in which computer virus can infect your computer.
2. What is computer virus?

Sub-Topic 2:
(c) Examples of Viruses
The following are example of computer virus:
i. Trojan horse
ii. Sleeper
iii Logic bomb
iv. Alabama virus
v. Christmas virus
vi. Worm
vii. Data crime virus
viii Jerusalem Virus
ix. Barcelona virus
x. April 1st virus

(d) Sources of Viruses


Virus infection can happen through the following:
i. Infected diskettes
ii. Hard drive
iii. Infected CD ROMS
iv. Internet download
v. E-mail
vi. Illegal duplication of software
vii. Bad handling of computer

Evaluation
1. List ten (10) of computer viruses you know.
2. Explain four out of (1) above how it can infect your computer.
3. List and explain three sources of viruses.

Reading Assignment
Read the source of viruses and how it can be protected.

Weekend Assignment:
Objective Test:
1. Avast, MacAfee, Disk and Dr. Solomon are example of __ (a) Computer Virus (b) Computer
Stone (c) Computer Antivirus (d) Computer system
2. The program used in protecting and detecting virus in the computer system is called. (a)anti-
protection program (b) ant-virus program (c) diskette program (d) high level program
3. Which of the following is NOT a virus warning sign? (a) illegal duplication of software
(b) incomplete saving of file (c) presence of tiny dots (d) programs take a long time to load
4. Computer virus is ____ (a) A program (b) A disease (c) Bacteria (d) Hardware
5. The followings are Anti-virus software except __ (a) McAfee (b) Norton (c) Avast (d) June
12

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 12th – 16th October, 2020
Term: 1st
Week: Five
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: COMPUTER VIRUS (Cont.)
Sub Topic: Virus warning and Virus Detection
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
1. List and explain 5 signs of virus infection.
2. What is the cure of computer virus infection?
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
COMPUTER VIRUS
Virus warning signs and Virus detection (ANTIVIRUS)
(e) Virus warning signs
Virus infection can cause a malfunction of the computer system in the following ways:
i. Slowing down of the response time.
ii. Presence of tiny dots.
iii. Wandering across the screen.
iv. Incomplete saving of file.
v. Corruption of the system set up instruction.
vi. Appearance of strange characters.
vii. It can cause organized program into a disorganized program and making them not to execute.
viii. It destroys the partition task file, even the entire system of hard drive.
ix. It causes damage to valuables stored on any storage media.

(f) Virus detection (ANTIVIRUS)


Antivirus is a program developed to destroy computer virus wherever it is found in the system. It is designed
to eradicate the infection act of the virus program.

Examples of Antivirus software


i. Norton-Antivirus
ii. McAfee Virus scan
iii. Dr. Solomon’s Took kit
iv. Penicillin
v. Microsoft
vi. Check point antivirus
vii. Central point antivirus
Assignment
1. List and explain 5 signs of virus infection.
2. What is the cure of computer virus infection?
3. List 5 you know of anti-virus of virus infection.

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 19th – 23rd October, 2020
Term: 1st
Week: Six
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: CISCO INTRO TO IT ESS 6.0
Sub Topic: Introduction to Personal Computer
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
a. Explain how to keep personal computer components safe.
b. Explain the features and functions of computer components.
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
INTRODUCTION TO PERSONAL COMPUTER
ADAPTER CARD
 Computers have expansion slots on the motherboard to install
adapter cards.
 The type of adapter card connector must match the expansion slot.
 Common expansion slots include:
 Peripheral Component Interconnect (PCI)
 Mini-PCI
 PCI eXtended (PCI-X)
 PCI Express (PCIe)
 Riser card
 Accelerated Graphics Port (AGP)

STORAGE DEVICE
 Data drives provide non-volatile storage of data.
 Some drives have fixed media, and other drives have
removable media.
 Data storage devices can be classified according to the media
on which the data is stored:
 Magnetic – like hard disk drive and tape drive
 Solid state – like solid state drive
 Optical – like CD and DVD

PORTS AND CABLES


 A video port connects a monitor to a computer using a
cable.
 Video ports and monitor cables transfer analog signals,
digital signals, or both.
 Video ports and cables include:
 Digital Visual Interface (DVI)
 DisplayPort
 High-Definition Multimedia Interface
(HDMI)
 Thunderbolt 1 or 2
 Thunderbolt 3
 Video Graphics Array (VGA)
 Radio Corporation of America (RCA
 Input/output (I/O) ports on a computer connect peripheral devices, such as printers, scanners, and
portable drives.
 A computer may have other ports:
 Personal System 2 (PS/2)
 Audio and game port
 Network
 Serial AT Attachment (SATA)
 Integrated Drive Electronics (IDE)
 The Universal Serial Bus (USB)

ADAPTERS AND CONVERTERS


 There are many connection standards in use today. These components are called adapters and converters:
 Converter – performing the same function as an adapter but also translates the signals from one
technology to the other.
 Adapter – physically connecting one technology to
another
 Example of adapters include:
 DVI to VGA Adapter
 USB to Ethernet adapter
 USB to PS/2 adapter
 DVI to HDMI adapter
 Molex to SATA adapter
 HDMI to VGA converter

INPUT DEVICES
OLD INPUT DEVICES
 Input devices all the user to
communicate with a computer.
 Some of the first input devices
include:
 Keyboard and Mouse – these are
the two most commonly used input devices
 ADF / Flatbed Scanner – these devices digitize an image or document
 Joystick and Gamepad – these devices are used for playing games
 KVM Switch – a hardware device that can be used to control more than one computer while using a
single keyboard, monitor, and mouse
NEW INPUT DEVICES
 Some new input devices include touch screen, stylus, magnetic strip reader, and barcode scanner:
 Touch screen – input devices with touch or pressure sensitive screens
 Stylus – a type of digitizer that allows a
designer or artist to create artwork by
using a pen-like tool
 Magnetic strip reader – a device that
reads information magnetically encoded
on the back of plastic cards
 Barcode scanner – a device that reads the information contained in the barcodes affixed to products
 Digital camera – devices that capture digital images and videos
 Webcams – video cameras that can be integrated into a computer
 Signature pad– a device that electronically captures a person’s signature
 Smart card reader – a device used on a computer to authenticate the user. A smart card may be the size
of a credit card with an embedded microprocessor that is typically under a gold contact pad on one side
of the card.
 Microphone – a device that allows a user to speak into a computer and have their voice digitized
 The newest input devices include NFC devices and terminals, facial recognition scanners, fingerprint
scanners, voice recognition scanners, and virtual reality headsets:
 NFC devices and terminals – Near Field Communication (NFC) tap to pay devices
 Facial recognition scanners – devices identifying a user based on unique facial features
 Fingerprint scanners – devices identifying a user based on unique fingerprint
 Voice recognition scanners – devices identifying a user based on unique voice
 Virtual reality headset – used with computer games, simulators, and training applications with virtual reality fun

OUTPUT DEVICES
 An output device takes binary information from the computer and converts it into a form that is easily
understood by the user.
 Examples of output devices include monitors, projectors, VR headsets, printers, speakers, and
headphones.

MONITORS AND PROJECTORS


 Most monitors use one of three types of technology:
 Liquid crystal display (LCD)
 Light-emitting diode (LED)
 Organic LED (OLED)
 Most video projectors use LCD or DLP technology.
 DLP stands for Digital Light Processing
Different projectors have different numbers of lumens, which affects the level of brightness of the projected
image
VR AND AR HEADSETS
 Virtual Reality (VR) uses computer technology to create a simulated, three-
dimensional environment.
 A VR headset completely encases the upper portion of users’ faces, not allowing in
any ambient light from their surroundings.
 Augmented Reality (AR) uses similar technology but superimposes images and
audio over the real world in real time.
 AR can provide users with immediate access to information about their real
surroundings.
An AR headset usually does not close off ambient light to users, allowing them to see
their real life surroundings

PRINTERS
 Printers are output devices that create hard copies of files.
 A hard copy might be a on a sheet of paper. It could also be a
plastic form created from a 3D printer.
 Different types of printers:
 Inkjet, impact, thermal, laser, and 3D printers
 Printers use wired or wireless connections
 All printers require printing material (such as ink, toner,
liquid plastic, etc.)
 Printers use a driver to communicate with OS

SPEAKERS AND HEADPHONE


 Speakers are a type of auditory output device.
 Most computers and mobile devices
have audio support either integrated into
the motherboard or on an adapter card.
 Headphones, earbuds, and the earphones
found in headsets are all auditory output
devices.
 These may be wired or wireless. Some
are Wi-Fi or Bluetooth-enabled.

EVALUATION
1 Explain how to keep personal computer components safe.
2 Explain the features and functions of computer components.

ASSIGNMENT
Explain how to keep personal computer components safe.
Explain components in a computer.
Explain electrical and ESD safety.
Explain the features and functions of computer components.
Describe cases and power supplies.
Describe motherboards.
Describe CPUs.
Explain types of memory.
Describe adapter cards and expansion slots.
Describe hard disk drives and SSDs

____________________________
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name: FOLARIN OLUWABUNMI FOLAKE AYOTEMI
School: Remo Divisional High School (Jnr)
Date: 2nd – 6th November, 2020
Term: 1st
Week: Seven
Class: J. S. S. TWO
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 30 minutes per week
TEST QUESTION

i. Explain how to keep personal computer components safe.


ii. Who is a computer operator?
iii. List and explain 5 signs of virus infection.
iv. What is the cure of computer virus infection?
v. List 3 types of Computer memory.

____________________________
Folarin O.F.A. (Miss)
Teacher’s Signature and Date

_________________________
HOD Signature and Date
LESSON NOTE
Name:
School: Remo Divisional High School (Jnr)
Date: 2nd – 6th November, 2020
Term: 1st
Week: Eight
Class: J. S. S. THREE
Subject: Computer Science (ICT)
Age Range: 13years
Duration: 60 minutes per week
Topic: SEARCH ENGINE
Sub Topic: Meaning and uses of Search Engine
Instructional Material: Installation CD and computer system
Behavioural Objectives: By the end of the lesson the students should be able to:
a. Differentiate between a search engine and a WWW.
b. How is a Search Engine different from a web directory?
Reference Materials: Computer Studies for Junior Secondary Education (JS 3): HiiT Plc, 2010,
www.google.com, www.wikipedia.com,
PRESENTATIONS
st
1 Period – Revision of last session work and Introduction of new topic.
Explanation of new topic and demonstration with Instructional Materials
2nd Period – Writing of note and classwork
Step I: She asks questions on previous knowledge of the student on the topic.
Step II: She introduces the new topic, explain and start illustration with Instructional Material
Step III: She gives notes according to the content and monitors the students while writing.
CONTENT
SEARCH ENGINE
Meaning of Search Engine
What is a search engine?
A Search Engine is a site on the WWW, with the help of which you can search for other website. It is more
powerful than a web directory. It will search for the web on the basis of the keyword (s) that you give. A
search engine is more effective than a web directory because it matches your information (keywords) to the
web pages listed in its index and then displays only on those sites that are relevant and match your criteria. It
is a website that allows you to search the internet for a specific topic.
Search engine is a tool for locating information on the internet by topic. A web search engine is an
interactive tool to help people locate information available via the World Wide Web. Examples of search
engines are Yahoo.com, Mamma.com Ask.com, Google.com , Netscape navigator, Askjeeves, Lycos,
Mozilla firefox ,Internet explorer Safari.com etc.

EVALUATION:
1. Differentiate between a search engine and a WWW.

USE OF SEARCH ENGINES


Search Engines can be used to:
 Easily find and download information on any topic
 Get definition of words, acronyms etc.
 Carry out research.
 Used to find images, pictures and sound
 Search for information about people, places and product

How to use a Search Engine: Type the URL(Uniform Resource Locator) of the search engine e.g
www.mamma.com) in the address bar of the browser and press the Enter Key on your keyboard.
Other examples of search engines
- www.google.com
- www.mama.com
- www.ask.com
Also you can use the search engine by entering a query (or question) in the search bar of the search engine
and press the Enter Key on the keyboard.

EVALUATION:
1. What is a Search Engine? Explain five use of the search engine.
2. How is a Search Engine different from a web directory?

SSIGNMENT:
Students are to use the internet or page 16 of their textbook (Handbook on Computer Studies book 3) to
explain any 5 search engines they know.

You might also like