0% found this document useful (0 votes)
286 views7 pages

3rd Term Scheme of Work JSS 2

The document outlines the scheme of work for Computer Studies for JSS 2 at Kings High School, Enugu, covering topics such as ICT, the Internet, computer ethics, and safety measures. It includes a week-by-week breakdown of subjects, including definitions, benefits, disadvantages, and practical activities like creating email accounts and sending emails. The curriculum aims to educate students on the responsible use of technology and the importance of computer safety.

Uploaded by

mimilistic77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views7 pages

3rd Term Scheme of Work JSS 2

The document outlines the scheme of work for Computer Studies for JSS 2 at Kings High School, Enugu, covering topics such as ICT, the Internet, computer ethics, and safety measures. It includes a week-by-week breakdown of subjects, including definitions, benefits, disadvantages, and practical activities like creating email accounts and sending emails. The curriculum aims to educate students on the responsible use of technology and the importance of computer safety.

Uploaded by

mimilistic77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

KINGS HIGH SCHOOL, ENUGU

SUBJECT: COMPUTER STUDIES FOR JSS 2


SUBJECT TEACHER: MR. PHILIP CHUKWU
SCHEME OF WORK

WK Topics Contents
1 ICT as transformation tool a. Meaning of ICT
b. Examples of ICT
2 ICT as transformation tool (contd.) a. Benefit of ICT
b. Disadvantage of ICT
3 Internet Definition:
i. Internet
ii. Email Address
iii. World Wide Web.
4. Internet (contd.) a. Creating of Email account
b. Samples of Email address
5 Internet (contd.) a. Internet environment.
b. Uses of internet.
6 Mid-Term Test Mid-Term Test
7 Mid-Term break Mid-Term Break
8 Internet (contd.) a. Sending and receiving mails.
b. Chat on internet.
9 Computer Ethics a. Meaning of computer Ethics
b. Responsible use of computer
and internet
c. Areas of misuse of computer.
10 Safety measures Safety measures
11 Revision Revision
12 Examination Examination
13 Closure Closure
WEEK ONE

ICT AS A TRANSFORMATION TOOL


ICT is a range of technology for gathering, storing retrieving, processing, analysis and
transmitting information.
Also, it is a set of activities that facilities captures, stores, processes, transmitting and display
information by electronics.

Examples of ICT
1. Computer: It is a device capable of accepting data, processing these data understored
instructions in order to produce a desired result.
2. Telephone: It is a long-range portable electronic device for personal telecommunication
over long distance.
3. Television: It is a telecommunication system for broad casting and receiving pictures and
sound over a long distance.
4. Satellite communication: Its any object in orbit. Satellite can be made or naturally
occurring such as moon, planet, stars, and even galaries. Satellite coomunication
transmits signals from the earth up to a satellite and then receiving the signal back.
5. Cellular network: A cellular or mobile network is a network where the link to and from
end nodes is wireless.
6. Internet: It is a global network providing a variety of information and communication
facility consisting of interconnected networks using standardized communication
protocol.
7. Radio: Radio is an electronic device that receives wireless signal or radio waves
transmitting from a radio broadcasting station.

WEEK TWO

Benefit of ICT
a. It is timely, better and cheap to access
b. It has speed up transaction and its process.
c. ICT enhance data/information security
d. It facility the capture, storage, processing, transmission and display of information by
electronic means.

Disadvantages of ICT
1. It is expensive to acquire or purchase ICT gadget.
2. ICT gadget are electronic, they require electricity to function, therefore you must have
access to electricity before you make use of them.
3. ICT can be used for job human beings are meant to do thereby causing loss of job among
people in the work force.
4. They are prone to damage and this could lead to loss of vital information stored in them.
5. They are prone to attack by hackers.
6. It threatens some areas of human endeavors
7. It affects peoples skills acquisition because many depends on it for their easy lives.
8. It brings about privacy.
WEEK THREE

INTERNET

a) Internet is the interconnection of two or more network, it connect universities, research


facilities, government organization and individual, allowing them to access share and
exchange information.

b) Email: It refers to the messages sent electronically from one computer user to one or
more recipient through communication network such as the internet. It is the most
popular and widely used services on the internet today.

For an email message to be sent and received, the following must be in place: Mail
Server and mail client. To be able to send and receive email each user must have an email
address, which is unique to the user and consists of two part separated by @ symbol. The
first part is the user name, which can be a real name, that is the name of your ISP i.e
internet service provider. The general form of an email address is as follows:

Username @ Domain name

[email protected]

c) World wide web: It is a huge set of inter linked documents, images and other resources,
linked by hyper links and URLs. These hyper links and URLs allow the web servers and
other machines that store, original copies of the resources to deliver them as required
using HTTP i.e Hyper Text Transfer Protocols which is one of the communication
protocols used in the internet.

d) Internet browser: It is a software program that enables internet users to browser or surf
the web. There are many internet browser available, but the following are the common or
popular ones internet explorer, Netscape navigator, mozillafirefox, Safari, Google
chrome etc.

e) Microsoft Internet Explorer: It is one of the web browser that access web page and allows
the user to navigate from one web to another via hyper links. It is a software application
used to locate web page.

f) Netscape: It introduces new plug in background colour for tables, the archive attribute
and the app. Element, The Netscape browser include the following: Version 1.0 through
4.8, 3.050, 7.0.

g) Mozilla: This internet browser implement most current web standards in addition to
several features. It runs on various versions of Linux Microsoft.
WEEK FOUR

Creating Email account


1. Click the internet explorer icon on the desktop.
2. Type WWW.yahoo.com on the URL address field.
3. The yahoo. mail services displays.
4. Click on the free e-mail sign up now
5. A dialogue box displays with options.
6. Choose yahoo. Mail or Gmail..
7. The registration form displays, fill in the form carefully.
8. Click on agree to complete the form.

Samples of Email address


Assignment for the students

Internet Environment
The following are found in the internet environment

a. It allows the user to navigate back to pages or site visited.


b. Forward: It allows the users to move front between pages or sites.
c. Stop: It stops the browser from finding a site in case of a change of mind.
d. Refresh: Since website can change and update at anytime, refresh allows the computer to
get the very latest version of site.
e. Home: This is the first page the browser open up to when a user visits the internet. The
home is also known as HOME PAGE.
f. Favorite: This is a tool which allows a user to bookmark sites on the internet so that such
site could be visited again without having to search to for it.
g. Search: It allows a user to search for sites and information on the internet.

In the internet environment, the internet explorer access the user to navigate from one place to
the other via hyperlink.

Also, web browser which is one of the software program, helps you to find, retrieve, views, send
hyper text and hyper media documents over the web.

User of Internet
i. Use to send and receive email
ii. Use for network group
iii. Use for surfing or chatting
iv. Use for research purposes
v. Use for shopping purposes
WEEK FIVE

Benefits of Internet
i. E-learning
ii. Information exchange
iii. Online Transaction
iv. E-entertainment
v. Search tools
vi. Fast and convenient
vii. Remove of barrier of distance.

Abuse of Internet
a. Malware
b. Hacking
c. Plagiarism
d. Piracy
e. Spamming
f. Fraud.

Also the following can be found in the internet environment:

 Electronic libraries
 Electronic Report
 Weather Forecast
 Stock market report
 Music, Video and pictures
 Travel agencies
 Multimedia Broadcast
 Museum, Galleries, and their collection.

Creating an Email account


i. From your internet browser, navigate to the sign up page for your email provider.
ii. Enter your details to open an email account.
iii. Follow the rest of the steps as required.
iv. Accept “Terms of services”.
v. Start using your new email account which could be [email protected]

WEEK EIGHT

Sending an email to someone


a. Double click on the internet explorer icon on the desktop to launch the browser.
b. Type www.yahoomail.com\ in the address bar and press enter.
c. Type your email address on the text box for user name. The press tab to move the cursor
to the password text box. Type your password.
d. Click sign in and wait for your email box to open.
e. Click on compose message
f. Type the email address of the person you are sending the email to in the text box labeled
to Example [email protected]
g. Type the title of the message in the text box labeled subject. E.g.; Greeting
h. Click on the message box and start typing your message.
i. After typing the message, click to send the message to the recipient.

WEEK NINE

Computer Ethics
Ethics cover those actions that have serious consequences in the lives of others. These are the
sort of activities that you label right or wrong.

It is the set of principles and standards we use in dealing with what to do or situation that affects
other people.

Responsible use of computer and internet.


i. Always shut down the computer properly after using.
ii. Unplugging the computer from wall socket when not in use.
iii. Ensure that the computer room is well ventilated and dust free from dust.
iv. Do not access file or document that is not yours.
v. Always check your email and reply them as fast as possible.
vi. Use computer anti-virus to protect your computer system.
vii. Do not use the computer to cheat or deceive others.

Areas of misuse of computer and internet


1. Impression: This involves temporarily altering the security context of the server so that it
matches that of the client.
2. Fraud: Computer fraud is a cyber crime and the act of using a computer to take or alter
electronic data or gain unlawful use of a computer system.
3. Spamming: Spam is unwanted, unsolicited digital communication sent out in bulk.
4. Invasion of privacy (Hacking): This offense occurs when a person knowingly uses a
computer with an intention to obtain unauthorized access to any data stored in a
computer.

WEEK TEN

Safety Measures

Since the needs for safety is so important, some of the safety measure to apply before and when
using a computer includes:

a) Sitting postures/postures: Here, the good postures should be applied to avoid back pain or
dislocation.
b) Use of anti glare protector: You have to position your monitor well to reduce the amount
of glare from both internal and external lighting. Use of anti glare protector reduces the
light rays that can affect the eye.
c) Proper positioning of monitor base: Your monitor should be elevated enough so that you
can comfortably view the screen without craving your neck up or down.
d) Illuminating the computer room: Computer room must be illuminated so as to avoid one
stepping on any electrical connection.
e) Maintaining a dust free environment because dust can bring about computer virus.
f) Keep liquid away from computer: Liquid substances such as water can damage the
computer system hardware when mistakenly poured on those physical components.
g) Protecting your computer from electrical damage prevent this damage, your computer
manufacturers strongly recommends the use of a high quality surge suppresser. Surge
suppresser regulates the flow of electricity to your computer equipment.

You might also like