0% found this document useful (0 votes)
10 views12 pages

Computer Note

The document outlines a scheme of work covering topics such as malware, computer viruses, search engines, spreadsheets, and computer professionals over a 12-week period. It includes definitions, types, warning signs, and sources of malware and viruses, as well as the functionality and uses of search engines and spreadsheets. Additionally, it discusses the roles and qualities of computer professionals and provides assignments related to the topics covered.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views12 pages

Computer Note

The document outlines a scheme of work covering topics such as malware, computer viruses, search engines, spreadsheets, and computer professionals over a 12-week period. It includes definitions, types, warning signs, and sources of malware and viruses, as well as the functionality and uses of search engines and spreadsheets. Additionally, it discusses the roles and qualities of computer professionals and provides assignments related to the topics covered.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SCHEME OF WORK

WEEK TOPICS CONTENTS


S

1 Malware Meaning, Types, and Examples.


Warning Sign Sources and Detection
of Malware

2 Viruses Definition and Examples, Sources


and Protection

3 Search Engines Definition, Examples, uses and


Terminology

4 1st C.A Test

5 Spread Sheet Introduction to MS Excel


Environment

6 Practical on
Spread Sheet

7 Computer Definition types of Computer


Professional Professional

8 2nd C.A Test

9 Logic Gate Logic Gate: AND, OR, NOT, etc.

10 Truth Table Truth Tables of the Various Gates

11 Revision

12 Examination

MALWARE
Malware is short for malicious software. It destroys the computer by
destroying the various files that are kept in the computer. They are made
by hackers to infect people’s devices to get their personal information or
bank details. It locks down the system. They enter the computer through
the files that you into your system. They begin to send personal
information to their creator.

TYPES OF MALWARE

1. VIRUS: Virtual Important Resources Under Siege. It attaches


malicious codes to clean codes and waits for unsuspecting user to
start the computer
2. Ransom Ware: This holds your PC hostage and demands money. It
locks up your computer, threatens to destroy data, demanding
payment for the release of your data, files or to regain the ability to
use the computer
3. WORMS: Writes One Reads Many Software. They can replicate
themselves and infect multiple computers on a network causing
major damage.
4. Spam and Phishing: These spams can send advertisement to
deceive people on the internet.
5. Trojan Horse: Most of them comes s games, and after playing the
game you will not know that you are inviting some sort of malware
into your system.
6. Spyware: This secretly gathers personal information about the
user’s activity and logs keys strokes, via the process of key logging
to steal passwords and other sensitive data
7. Botnet: A boot is a computer that has been infected with a
malware, which can be controlled by the hacker.

WARNING SIGNS OF MALWARE INFECTION

1. Blue screen of death. A screen appears and you can’t click anything.
2. A slow crashing or freezing computer.
3. Random letters begin to show on the screen.
4. Emails and messages been sent without prompting.
5. Programs opening and closing automatically or altering themselves
6. Increased pop-up, toolbars and other unwanted programs

SOURCES OF MALWARE
1. Through your storage devices.
2. Lack of security updates.
3. Use of weak passwords.
4. Download of files from the internet.

COMPUTER VIRUSES
A computer virus is a computer program which spreads by inserting
copies of it into other programs or files to prevent the computer from
working normally. A computer virus is normally loaded without the user’s
permission

A virus can be spread when it host is taken to an infected computer, e.g.


when a user send a file over a network. It is carried over a removable
storage network such as CD and USB.

It can be very destructive, they can format override hard drives, boot
sector, delete file and even render the computer ineffective, and the
users un productive

TYPES OF VIRUSES

1. Resident virus
2. Browser hijacker
3. Macro virus
4. Stealth virus
5. Boot sector virus
6. Over write virus
7. Multipartite virus
8. Executable file virus

EXAMPLES OF VIRUS

1. Christmas virus
2. Time bomb virus
3. Jerusalem virus
4. Logic virus
5. Sleep virus
6. Melisa virus
7. Alabama virus
SOURCES OF VIRUSES
1. Internet downloads
2. Email attachment
3. Illegal duplication of virus

WARNING SIGN OF VIRUSES

1. Computer becomes slow


2. Appearance of tiny dots of your system
3. Opening and closing of apps
4. Termination of booting processes
5. Pop-up window on your screen
6. Incomplete downloading

DIFFERENT TYPES OF ANTI-VIRUSES

Anti-virus software is software that protects the computer against


malicious software. Examples are;

1. SMADAV
2. AVG
3. RAV Endpoint Protection
4. Avast Anti-Virus
5. Panda
6. Bit defender
7. Rotor
8. Norton
9. MC AFEE; etc.

SEARCH ENGINES
Search engines are web based tools that enables users to locate
information on the internet or World Wide Web (WWW). It is a software
system that is designed to allow people to search for information. It is
based on key terms that they entered into the search bar by the users.
The information that is presented may be in mixture of web pages,
images and other types of files.

HOW SEARCH ENGINES WORK


1. Crawling: Content is discovered through “bots” that scan websites
for texts, links, images, ads etc.
2. Indexing: Crawled content is sorted and filed in huge databases. It
is regularly updated thanks to crawling.
3. Ranking and Retrieval: The safe where content is retrieved in
response to a query, using algorithms.

TYPES OF SEARCH ENGINES


1. Google
2. Bing
3. Yahoo
4. Baidu
5. Yandex
6. DuckDuckGo
7. Ask.com
8. Mama
9. WebCrawler etc.

USES OF SEARCH ENGINES


1. For research
2. For shopping
3. For entertainment.

DIFFERENCES BETWEEN A BROWSER AND A SEARCH ENGINE

A browser is a piece of software that retrieves and displays web pages. A


search engine is a website that helps people finds web pages from other
websites. The confusion arises because the first time someone launches
the browser, the browser displays a homepage. This makes sense
because the first thing you want to do with a browser is to find a webpage
to display.

Examples of browsers are Mozilla Firefox, Safari, Google Chrome MSN,


Crazy Browser, and more.

USES OF A SEARCH ENGINE

1. To carry out research


2. To search about people, places and product
3. To get the definition of words
4. To download applications on the internet
5. To look up other websites
6. To shop online
ADVANTAGES OF SEARCH ENGINES
1. Accurate results
2. Various filtering options
3. Uses built-in toolbox features
4. Easy to access Google books
5. Search engines provide a deeper knowledge that helps people with
all the information they need.
ASSIGNMENT

Answer the assignment question on your portal on search engines and


send it to my email box. [email protected]

SPREADSHEET PACKAGES
A spread sheet is also called electronic work sheet. It is the computer
equivalent of a paper ledger. It is used to calculate and create grafts. It is
also used to organise information into rows and columns to make it easier
for the user to understand and retrieve information easier

EXAMPLE OF SPREAD SHEET PACKAGE

1. Open office Cal


2. MS Excel
3. Google sheet
4. Quarto pro
5. Spread 32
6. SPSS
7. G numeric
USES OF SPREAD SHEET
1. They are used for complex data calculation
2. They are used to produce grafts and chart from data imputed into
different cell
3. They are used to sort data alphabetical and numerically
4. They are used to generate report on the path of an organisation
school individual etc. on daily basis
5. They are used to keep record of all employer in an organisation
6. They are used for carrying out financial task such as budgeting,
preparing workers’ salaries, insuring invoices and receipt
7. They are used for calculate grades, sales record etc.
FEATURES OF A SPREAD SHEET

There are different feature that make up a spread sheet. Some of them
are;

1. Columns: This is the vertical of a spread sheet. Columns are


identified by letters.
2. Rows: This is the horizontal division of the work sheet. Rows are
identified by numbers.
3. Cells: This is the box formed by the intersection of a row and a
column. Each cell is assigned a name according to it column letter
and row number. When referring to a cell, you should use the
column letter first, then the row number second.
4. Workbook: This is a file in which data is processed or stored. A
workbook has more than one work sheet, which can be used to
organise various types of information of a single file.
5. Worksheet: This is a page in the work book this is used to analysis
and store data. A work sheet consists of cell they are organised into
row and column. A work sheet is also called spread sheet.
6. Chart: This is the graphical representation of analysed data. A
graph makes it easy to understand the relationship between series
of data.
7. Cell Range: This refers to a selected block of cells in a work sheet.
E.g., cells A1-A6 and cells B1-B6 taken together is a range of cell.
8. Active cell: The active cell is the sell currently selected for every
data entry.
ASSIGNMENT
1. Answer the leading questions on computer professionals
2. Do the assignment on computer professionals.

COMPUTER PROFESSIONALS

Computer professionals are persons working in the field of computing that


has undergo training in one field or another.

TYPES OF COMPUTER PROFESSIONAL

1. Computer engineer
2. Computer programmers
3. Computer analyst
4. Computer administrator
5. Computer educationalist
6. Computer operators
7. Data processing officer

1. COMPUTER ENGINEERS: They combine the field of computing and


electrical engineers. They create new hardware and software
involved in the design of computer architecture. They can also
function as computer software engineer. They are responsible for
microchip on the computer.
2. COMPUTER EDUCATOR: They are responsible for teaching
computer programing or usage skill for student on school
qualification needed on this field will be a bachelor’s degree in
computer science or any related experience
3. COMPUTER GRAPHIC ARTIST: They create digital design in
photograph and drawing what computer software programs. Their
designs are used for websites E.T.C
4. COMPUTER PROGRAMMER: They turn designs created by
software developers or engineer in form of instruction that the
computer follows
5. COMPUTER ANALYST: Analyst design computer system that best
meets the individual companies needs by updating or creating a new
system
6. DATA BASE ADMINISTRATOR: They are expert in storing and
organizing data so that user can get the information they need.
7. IT PROFESSIONAL: They ensure an organisation needs will be
given by their sequence.

QUALITIES OF A GOOD COMPUTER PROFESSIONAL

1. Paying attention to the details


2. Team spirit
3. Great analytical skill
4. Solve complex calculator
5. Commitment to work and self-development
6. Multi-tasking
7. Versatile
8. They must be creative
9. They must be flexible and open mind
10. They must be able to maintain standard and set these standard
in documentation and production.
11. They must possess the require education and training
12. The must be honest and trust worthy
13. They must belong to a professional body
ASSIGNMENT
1. Complete unit 2 in your work on code.org
2. Answer leading question on computer professional

Assignment

1. What is logic gate?

2. Draw the 7 logic gate and their truth table

Answer

1. A logic gate is a device that acts as a building block for digital circuits.
They perform basic logical functions that are fundamental to digital
circuits. Most electronic devices we use today will have some form of
logic gates in them.

OR

Logic gates are fundamental building blocks of digital circuits. They are
electronic devices that perform logical operations based on Boolean logic.
They take in one or more binary inputs and produce a single binary
output based on predetermined logical functions (AND, OR, NOT, etc.).
These gates are the foundation for creating complex circuits and are used
extensively in computer hardware and electronics to process and
manipulate binary information.
ND
2 TERM
APPLICATION AREAS OF ICT
TEACHMINT ASSIGNMENT

1. Explain 5 application areas of ICT.


2. State 5 advantages and 5 disadvantages of ICT.
3. What are ICT gadgets?
4. List 10 ICT gadgets you know.
ANS
1. Education: ICT is extensively used in education for e-learning,
online courses, digital textbooks, and educational software.
2. Healthcare: In healthcare, ICT is employed for electronic health
records (EHR) telemedicine, medical imaging, and health
information system.
3. Business and commerce: It helps making accurate calculations
in profits and losses.
4. Communication and social interaction: ICT plays a central
role in communication through various channels such as email,
social media, messaging apps, and video conferencing.
5. Government services: Governments utilize ICT to provide
efficient and accessible public services.

Advantages of ICT
1. Improved communication
2. Increased productivity
3. Global connectivity
4. Innovation and creativity
5. E-Government services

Disadvantages of ICT
1. Cyber Bullying
2. Excessive impact
3. Job displacement
4. Social isolation
5. Health concerns

ICT Gadgets
ICT gadgets, or Information and Communication Technology gadgets,
refer to devices that utilize technology for communication, information
processing, and various other functions.

EXAMPLES
1. Smartphones and tablets
2. Laptops and computers
3. Smartwatches and fitness trackers
4. Digital cameras and camcorders
5. E-readers
6. Gaming consoles
7. Smart TVs
8. Fitness tech
9. Drones
10.Voice assistants
Components of a computer
A computer device I made up of various elements which heips in its
effective functioning and processing. These components are the
primary elements that makes the computer

You might also like