0% found this document useful (0 votes)
70 views11 pages

E-Note SS Three 2nd Term Data Processing

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views11 pages

E-Note SS Three 2nd Term Data Processing

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 11

NAME: ………………………………………………………………..………. CLASS: …………………………….

DEEPER LIFE HIGH SCHOOL


Website: www.dlhschools.com E-mail: [email protected]
SECOND TERM E-LEARNING NOTE

SUBJECT: DATA PROCESSING CLASS: SS 3

SCHEME OF WORK

WEEK TOPICS
1. Revision of last term’s work.

THEME: TOOLS FOR PROCESSING INFORMATION

2. Networking: (a) Meaning of Networking(Internet and intranet) (b) Types of Networking

THEME: COMPUTER MAINTENANCE AND HUMAN ETHICS ISSUE

3. Computer Virus: (c) ) Meaning of Computer Virus (d) Types of Virus


4. Computer Virus : (d) Examples of virus (e) Sources of virus
5. Computer Virus (f) Virus warning signs(g) Virus detection/Prevention
6. Maintenance of Computer: (a) Details of hardware maintenance
7. Computer Maintenance II: (b) Details of software maintenance
8. Career Options in Data Processing (a) Professions in Computer
9. Career options in Data Processing (b) Qualities of a good Professional
10. Revision
11-13 Examination.

REFERENCES:
1. Data Processing for Senior Secondary School 3, by Adedapo F.O
2. HiiT @ School, Computer Studies for Senior Secondary Education
3. Basic Concepts of Computer Studies for Senior Secondary Schools, by Samuel Ayokunle and
Adeleke Adekola.

WEEK 2

DATE:..........................................

CLASS: SS 3

TOPIC: NETWORKING
CONTENT:
1. Meaning of Networking (Internet and Intranet)
2. Types of Networking

SUB-TOPIC 1: Meaning of Networking

Networking is a system of connecting two or more computers together in order to share


resources or transfer information. The computers on a network may be connected through
cables, telephone lines, wireless links or satellite. Every computer connected to the network
is said to be on the network and should have a network interface card (NIC).

Networking can also be defined as a collection of computers and devices interconnected by


communications channels that facilitate communication among users and allow users to
share resources.

EVALUATION:

1. Define Networking.

SUB-TOPIC 2: Types of Networking


The following are types of Networking;

1. Token Ring: Token ring Network architecture was developed in the mid 1980s by IBM. It
uses a special three-byte frame called a token that travels around the ring. Physically
when implemented, the computer is connected through cables to a “HUB”. It is ring
topology network.

2. ARCNET: ARCNET is an acronym for Attached Resource Computer Network. It is a star


LAN topology network. ARCNET was developed by John Murphy at Data point
Corporation in 1976. It is used for office automation task.

3. Ethernet: This is a system for connecting a number of computer systems to form a local
area network with protocols to control the passing of information and to avoid
simultaneous transmission by two or more systems. It is a bus topology network. It
uses coaxial or twisted pair cables to connect computer systems.

EVALUATION:

1. Explain any TWO type of computer network


2. State TWO network topologies used by the two explained above.
GENERAL EVALUATION
(i) Explain the term ‘Networking”

READING ASSIGNMENT

Study the topic ‘Computer Virus’ using your students’ textbook

WEEKEND ASSIGNMENT
1. A system for connecting a number of computer systems to form a local area network
with protocols to control the passing of information and to avoid simultaneous transmission
by two or more systems.
(a) Ethernet (b) Internet (c) indexed (d) random
2. ARCNET was developed by John Murphy at Data point Corporation in................ (a)
1976 (b) 1980 (c) 1987 (d) 1967
3. Token ring Network architecture was developed in the mid 1980s by.........
(a) Data Corporation (b) IBM (c) IMB (d) J.Murphy
4. NIC stands for.........................
(a) Network Intel card (b) Interface network card (c) Network Interface
Card (d) Sequential
5. ……………. uses coaxial or twisted pair cables to connect computer systems.
(a) Ethernet (b) Internet (c) intranet (d) ARCNET.

WEEK 3 $ 4

DATE:..........................................

CLASS: SS 3

TOPIC: COMPUTER VIRUS

CONTENT:
 Meaning of Computer Virus.
 Types of Computer Virus.
 Examples of Virus
 Sources of Virus

SUB-TOPIC 1: Meaning of Computer virus


A computer virus is an executable program that is capable of replicating itself thereby causing
great harm to files or other programs on the computer it infects. A computer virus can spread
easily from one computer to another with the use of a storage media such as: Flash drives,
floppy, etc.

EVALUATION:

1. What is a Computer virus?

SUB-TOPIC 2: Types of Computer Virus


The two most common type of computer virus are;

1. Malware: These include;

i. Worms: A worm is a virus program that copies and multiplies itself by using computer
networks and security flaws. A classic example of a worm is the I LOVE YOU virus
discovered in 2000. Another latest worm was discovered in July 2010 called Stuxnet.

ii. Trojan horse: A Trojan horse is a computer program or file on the computer of a user
that makes the computer susceptible to malicious intruder by allowing them to access
and read users files. They do not multiply themselves as in the case of worm. An
example of latest Trojan horse is Alureon (discovered in 2010).

2. Virus file infectors

3. System or boot sector infectors

4. E-mail virus

5. Key logger

Examples of computer virus are;

Polyboot, Tuareg, Satan, Bug, Elkern, Asimov, Win 32, stator, Sasser, Welchia, Beagle, Netsky
etc.

SOURCE OF VIRUS:

Virus attacks are perhaps the greatest threats faced by computer users. Nowadays everybody
uses the internet and usually it is accessed through the computer. The internet is the main
culprit or source of computer viruses and the medium through which it spreads.

There are nerds or computer hackers or idle evil-minded genius and computer geeks who
create virus, Trojan worms, root kit, spyware malware and other such malicious and
dangerous software programs programs commonly known as computer virus, usually with an
evil intention and then spread the virus through the internet, through the internet, through
harmless looking e-mails. Etc. An unsuspecting individual, while opening this e-mail, usually
sent from an unknown source, will also download this virus unknowingly. Virus often travels
to your computer when you transfer or download music clippings or music files or movies into
our computer.

EVALUATION:

1. Explain the two type of virus known to you.

GENERAL EVALUATION
(i) Explain the term ‘Virus”

READING ASSIGNMENT
READ the topic ‘Computer Virus’ Warning signs, detection and prevention using your
students’ textbook

WEEKEND ASSIGNMENT
1. An act of breaking security policies, practices, or procedures.
(a) Security Breach(b) Internet breach(c) normal breach (d) random
2. Examples of computer virus include all, except................ (a)
Polyboot (b) Satan (c) Tuareg (d) 1967 lucky
3. A computer program or file on the computer of a user that makes the computer
susceptible to malicious intruder by allowing them to access and read users files is
called……………(a) Trolley horse (b) IBM Trojan (c) Trojan horse (d) Murphy
4. Alureon is an example of......................
(a) Trojan horse (b) Worm (c) green
Card (d) Security breach
5. ……………. Is the most important source of computer virus infection?
(a) Computer (b) Worm(c) hackers (d) Internet.

WEEK 5
DATE:..........................................

CLASS: SS 3

TOPIC: COMPUTER VIRUS

CONTENT:
 Virus warning sign.
 Virus detection /Prevention.

SUB-TOPIC 1: Virus warning sign

The following are some virus warning signs:


i. When the software program takes longer to load than they used to.
ii. When software programs crash for no apparent reasons
iii. When the computer checks the hard drive often
iv. When files disappear for no apparent reason.
v. When there is frequent file corruption
vi. When items that use to work are no longer working
vii. When you received e-mails from an un familiar source
viii. When you receive an unknown e-mail with attachments
ix. When you download frequently from common source.

EVALUATION:
1. List at least FIVE virus warning sign

SUB-TOPIC 2: Virus detection and Prevention


Do not pass on virus warning signs without first checking with an authoritative source.
Make sure you have a current version of antivirus software to check for virus. To prevent virus
you may do any of the following;
i. Purchase and install anti-virus software, and update it frequently

ii. Scan every file you receive

iii. Do not configure your e-mail program to launch your word processing
program automatically when it receives an attachment.

iv. Scan every file you download from the web before you install or read them

v. Be very careful about putting flash drives and floppy disk from unknown
source into your computer

vi. Backup all your data files on regular basis.

vii. Make sure that you have original disk or CD-ROMs for all your software.

viii. Regularly do quick or full systems scan on your computer.


EVALUATION:

1. State FIVE preventive measures against virus known to you.

2. What do we do to a virus warning sign?

READING ASSIGNMENT
READ the topic ‘Maintenance of a Computer” using your students’ textbook

WEEKEND ASSIGNMENT: Students are to browse the internet and find out more examples of
computer virus and ways of preventing them, submit on Monday.

WEEK 6 $ 7
DATE:..........................................

CLASS: SS 3

TOPIC: Maintenance of Computer

CONTENT:
 Details of Hardware Maintenance
 Details of Software Maintenance
SUB-TOPIC 1: Details of Hardware Maintenance
Hardware Maintenance tips

1. Do not allow heat and moisture on your system

2. Clean the computer case and clear its ventilation ports of any obstruction.

3. Keep a neat key board, turn the keyboard upside down and shake it to clear the crumbs
from between the keys. If that doesn’t suffice blast it briefly with compressed air. If the
keys stick or your keyboard really dirty, pry it off for easier cleaning.

4. Make your monitor sparkle by wiping the monitor case and clear its vents of
obstruction, without pushing into its unit.

5. Check your power protection.

6. Wipe your CD and DVD media gently with a moistened, soft cloth.

7. Use antistatic wipes for inside the system cleaning.


8. Avoid touching any part of the circuit board surface with your hand.

9. Replace CMOS battery when your time indicator losses.

SUB-TOPIC 2: Details of Software Maintenance


Maintenance, repair and operations (MRO) involves fixing any sort of mechanical or electrical
device should it come out of order or broken. It also includes performing routine actions
which keep the device in working order or prevent trouble from arising (Preventive
maintenance).

Categories of software maintenance:


i. Corrective Maintenance: This refers to modifications initiated by defects in the
software.
ii. Adaptive Maintenance: This includes any work initiated as consequence of moving
the software to a different hardware or software platform-compiler, operating
system or new processor.
iii. Perfective Maintenance: This refers to enhancements such as making the product
better, faster, smaller, better documented, cleaner structured.
iv. Preventive Maintenance: The purpose is making program easier to understand and
hence facilitate future maintenance work.

Software Maintenance Tips:

1. First backup all your file on a regular basis

2. Make use of a good antivirus program.

3. Use a registry cleaner regularly for the good health of the PC.

4. Clean temporary internet files from time to time.

5. Give your PC a periodic checkup with a good hardware diagnostic utility

6. Use registry mechanic

7. Defragment your hard drive at regular intervals, this allows data to be crammed on the
disk and free the maximum space available on the computer.

8. Start windows in safe mode when there is a trouble booting.


EVALUATION:

1. State FIVE Software maintenance tips known to you.

2. List SEVEN Hardware Maintenance tips you have learnt.

READING ASSIGNMENT
READ the topic ‘Career options in Data processing” using your students’ textbook

WEEKEND ASSIGNMENT: Students are to browse the internet for more Software and
hardware maintenance tips.

WEEK 8 $ 9
DATE:..........................................

CLASS: SS 3

TOPIC: Maintenance of Computer

CONTENT:
 Professions in Computer
 Qualities of a good computer professional

SUB-TOPIC 1: Professions in Computer


A Computer professional is one who deals with the computer industry to develop something.
They may design, build, sell, lease, or repair hardware, or they may sell, market or write
software. The definition now extends to those involved in the Internet industry.

To prepare for a career in the computer industry, you must first decide on the area in which
you are interested and then obtain education in that field. If you desire a formal education
several options are available, which include attending a college that offers two year degree or
a university that offers a four year degree. These colleges give certificates after the
completion of the degree.

The Following are careers in the computer profession

1. General business and IT department

2. Computer equipment field


3. Computer software fields

4. Computer service and repair fields

5. Computer Sales

6. Computer education and training field

7. IT consultation

SUB-TOPIC 2: Qualities of a good Computer Professional


Some of the qualities needed to be a successful computer professional are;

1. Excellent analytical skill: Computer professionals must have excellent analytical skills
that can be applied to solve problems or develop new ideas.

2. An attention to details: Computer professionals must pay close attention to detail to


ensure everything works correctly and efficiently.

3. A commitment to learning: Successful computer professionals should get information


about the latest developments in information technology because it is constantly
changing.

4. Good communication skill: Verbal and written communications are important for
everyday business. Understanding a client’s need and the ability to meet those needs
depends heavily on a steady stream of open communication.

5. An aptitude for mathematics: Computer professionals must have strong math’s skills,
because maths is used in many computer applications, such as when dealing with
circuits or programming.

6. Ability to learn new programming language: Computer professionals must know many
programming languages and how to use a wide variety of computer software programs.
A good memory helps one to work efficiently.

7. Ability to multitask: People working with computers are often involved in many tasks at
once, and must be able to manage all their responsibilities simultaneously. Time
management skills and an ability to prioritize is an asset.
8. Troubleshooting capabilities: Computer professionals are called upon to solve problems
with networks, software and other programs. They are expected to solve these
problems very quickly, and having sharp troubleshooting skill is a benefit.

9. Versatility: The most successful computer professionals will be the ones who have skills
that extend beyond information technology, such as skills in business and finance.

EVALUATION:

1. Who are computer professionals?

2. Name some of the fields where computer professionals are required.

GENERAL EVALUATION:
1. Name any FOUR kinds of computer professionals.
2. What are the qualities of a good computer professional?

WEEK 10: Revision

WEEK 11-13: Examination

*Plan an excursion trip to an ISP (internet service provider) and a web development company
in your area. This will expose the student to knowing how the internet is structured.
Preferably between week 7 and week 8.

You might also like