E-Note SS Three 2nd Term Data Processing
E-Note SS Three 2nd Term Data Processing
SCHEME OF WORK
WEEK TOPICS
1. Revision of last term’s work.
REFERENCES:
1. Data Processing for Senior Secondary School 3, by Adedapo F.O
2. HiiT @ School, Computer Studies for Senior Secondary Education
3. Basic Concepts of Computer Studies for Senior Secondary Schools, by Samuel Ayokunle and
Adeleke Adekola.
WEEK 2
DATE:..........................................
CLASS: SS 3
TOPIC: NETWORKING
CONTENT:
1. Meaning of Networking (Internet and Intranet)
2. Types of Networking
EVALUATION:
1. Define Networking.
1. Token Ring: Token ring Network architecture was developed in the mid 1980s by IBM. It
uses a special three-byte frame called a token that travels around the ring. Physically
when implemented, the computer is connected through cables to a “HUB”. It is ring
topology network.
3. Ethernet: This is a system for connecting a number of computer systems to form a local
area network with protocols to control the passing of information and to avoid
simultaneous transmission by two or more systems. It is a bus topology network. It
uses coaxial or twisted pair cables to connect computer systems.
EVALUATION:
READING ASSIGNMENT
WEEKEND ASSIGNMENT
1. A system for connecting a number of computer systems to form a local area network
with protocols to control the passing of information and to avoid simultaneous transmission
by two or more systems.
(a) Ethernet (b) Internet (c) indexed (d) random
2. ARCNET was developed by John Murphy at Data point Corporation in................ (a)
1976 (b) 1980 (c) 1987 (d) 1967
3. Token ring Network architecture was developed in the mid 1980s by.........
(a) Data Corporation (b) IBM (c) IMB (d) J.Murphy
4. NIC stands for.........................
(a) Network Intel card (b) Interface network card (c) Network Interface
Card (d) Sequential
5. ……………. uses coaxial or twisted pair cables to connect computer systems.
(a) Ethernet (b) Internet (c) intranet (d) ARCNET.
WEEK 3 $ 4
DATE:..........................................
CLASS: SS 3
CONTENT:
Meaning of Computer Virus.
Types of Computer Virus.
Examples of Virus
Sources of Virus
EVALUATION:
i. Worms: A worm is a virus program that copies and multiplies itself by using computer
networks and security flaws. A classic example of a worm is the I LOVE YOU virus
discovered in 2000. Another latest worm was discovered in July 2010 called Stuxnet.
ii. Trojan horse: A Trojan horse is a computer program or file on the computer of a user
that makes the computer susceptible to malicious intruder by allowing them to access
and read users files. They do not multiply themselves as in the case of worm. An
example of latest Trojan horse is Alureon (discovered in 2010).
4. E-mail virus
5. Key logger
Polyboot, Tuareg, Satan, Bug, Elkern, Asimov, Win 32, stator, Sasser, Welchia, Beagle, Netsky
etc.
SOURCE OF VIRUS:
Virus attacks are perhaps the greatest threats faced by computer users. Nowadays everybody
uses the internet and usually it is accessed through the computer. The internet is the main
culprit or source of computer viruses and the medium through which it spreads.
There are nerds or computer hackers or idle evil-minded genius and computer geeks who
create virus, Trojan worms, root kit, spyware malware and other such malicious and
dangerous software programs programs commonly known as computer virus, usually with an
evil intention and then spread the virus through the internet, through the internet, through
harmless looking e-mails. Etc. An unsuspecting individual, while opening this e-mail, usually
sent from an unknown source, will also download this virus unknowingly. Virus often travels
to your computer when you transfer or download music clippings or music files or movies into
our computer.
EVALUATION:
GENERAL EVALUATION
(i) Explain the term ‘Virus”
READING ASSIGNMENT
READ the topic ‘Computer Virus’ Warning signs, detection and prevention using your
students’ textbook
WEEKEND ASSIGNMENT
1. An act of breaking security policies, practices, or procedures.
(a) Security Breach(b) Internet breach(c) normal breach (d) random
2. Examples of computer virus include all, except................ (a)
Polyboot (b) Satan (c) Tuareg (d) 1967 lucky
3. A computer program or file on the computer of a user that makes the computer
susceptible to malicious intruder by allowing them to access and read users files is
called……………(a) Trolley horse (b) IBM Trojan (c) Trojan horse (d) Murphy
4. Alureon is an example of......................
(a) Trojan horse (b) Worm (c) green
Card (d) Security breach
5. ……………. Is the most important source of computer virus infection?
(a) Computer (b) Worm(c) hackers (d) Internet.
WEEK 5
DATE:..........................................
CLASS: SS 3
CONTENT:
Virus warning sign.
Virus detection /Prevention.
EVALUATION:
1. List at least FIVE virus warning sign
iii. Do not configure your e-mail program to launch your word processing
program automatically when it receives an attachment.
iv. Scan every file you download from the web before you install or read them
v. Be very careful about putting flash drives and floppy disk from unknown
source into your computer
vii. Make sure that you have original disk or CD-ROMs for all your software.
READING ASSIGNMENT
READ the topic ‘Maintenance of a Computer” using your students’ textbook
WEEKEND ASSIGNMENT: Students are to browse the internet and find out more examples of
computer virus and ways of preventing them, submit on Monday.
WEEK 6 $ 7
DATE:..........................................
CLASS: SS 3
CONTENT:
Details of Hardware Maintenance
Details of Software Maintenance
SUB-TOPIC 1: Details of Hardware Maintenance
Hardware Maintenance tips
2. Clean the computer case and clear its ventilation ports of any obstruction.
3. Keep a neat key board, turn the keyboard upside down and shake it to clear the crumbs
from between the keys. If that doesn’t suffice blast it briefly with compressed air. If the
keys stick or your keyboard really dirty, pry it off for easier cleaning.
4. Make your monitor sparkle by wiping the monitor case and clear its vents of
obstruction, without pushing into its unit.
6. Wipe your CD and DVD media gently with a moistened, soft cloth.
3. Use a registry cleaner regularly for the good health of the PC.
7. Defragment your hard drive at regular intervals, this allows data to be crammed on the
disk and free the maximum space available on the computer.
READING ASSIGNMENT
READ the topic ‘Career options in Data processing” using your students’ textbook
WEEKEND ASSIGNMENT: Students are to browse the internet for more Software and
hardware maintenance tips.
WEEK 8 $ 9
DATE:..........................................
CLASS: SS 3
CONTENT:
Professions in Computer
Qualities of a good computer professional
To prepare for a career in the computer industry, you must first decide on the area in which
you are interested and then obtain education in that field. If you desire a formal education
several options are available, which include attending a college that offers two year degree or
a university that offers a four year degree. These colleges give certificates after the
completion of the degree.
5. Computer Sales
7. IT consultation
1. Excellent analytical skill: Computer professionals must have excellent analytical skills
that can be applied to solve problems or develop new ideas.
4. Good communication skill: Verbal and written communications are important for
everyday business. Understanding a client’s need and the ability to meet those needs
depends heavily on a steady stream of open communication.
5. An aptitude for mathematics: Computer professionals must have strong math’s skills,
because maths is used in many computer applications, such as when dealing with
circuits or programming.
6. Ability to learn new programming language: Computer professionals must know many
programming languages and how to use a wide variety of computer software programs.
A good memory helps one to work efficiently.
7. Ability to multitask: People working with computers are often involved in many tasks at
once, and must be able to manage all their responsibilities simultaneously. Time
management skills and an ability to prioritize is an asset.
8. Troubleshooting capabilities: Computer professionals are called upon to solve problems
with networks, software and other programs. They are expected to solve these
problems very quickly, and having sharp troubleshooting skill is a benefit.
9. Versatility: The most successful computer professionals will be the ones who have skills
that extend beyond information technology, such as skills in business and finance.
EVALUATION:
GENERAL EVALUATION:
1. Name any FOUR kinds of computer professionals.
2. What are the qualities of a good computer professional?
*Plan an excursion trip to an ISP (internet service provider) and a web development company
in your area. This will expose the student to knowing how the internet is structured.
Preferably between week 7 and week 8.