3rd Term Scheme of Work JSS 2
3rd Term Scheme of Work JSS 2
WK Topics Contents
1 ICT as transformation tool a. Meaning of ICT
b. Examples of ICT
2 ICT as transformation tool (contd.) a. Benefit of ICT
b. Disadvantage of ICT
3 Internet Definition:
i. Internet
ii. Email Address
iii. World Wide Web.
4. Internet (contd.) a. Creating of Email account
b. Samples of Email address
5 Internet (contd.) a. Internet environment.
b. Uses of internet.
6 Mid-Term Test Mid-Term Test
7 Mid-Term break Mid-Term Break
8 Internet (contd.) a. Sending and receiving mails.
b. Chat on internet.
9 Computer Ethics a. Meaning of computer Ethics
b. Responsible use of computer
and internet
c. Areas of misuse of computer.
10 Safety measures Safety measures
11 Revision Revision
12 Examination Examination
13 Closure Closure
WEEK ONE
Examples of ICT
1. Computer: It is a device capable of accepting data, processing these data understored
instructions in order to produce a desired result.
2. Telephone: It is a long-range portable electronic device for personal telecommunication
over long distance.
3. Television: It is a telecommunication system for broad casting and receiving pictures and
sound over a long distance.
4. Satellite communication: Its any object in orbit. Satellite can be made or naturally
occurring such as moon, planet, stars, and even galaries. Satellite coomunication
transmits signals from the earth up to a satellite and then receiving the signal back.
5. Cellular network: A cellular or mobile network is a network where the link to and from
end nodes is wireless.
6. Internet: It is a global network providing a variety of information and communication
facility consisting of interconnected networks using standardized communication
protocol.
7. Radio: Radio is an electronic device that receives wireless signal or radio waves
transmitting from a radio broadcasting station.
WEEK TWO
Benefit of ICT
a. It is timely, better and cheap to access
b. It has speed up transaction and its process.
c. ICT enhance data/information security
d. It facility the capture, storage, processing, transmission and display of information by
electronic means.
Disadvantages of ICT
1. It is expensive to acquire or purchase ICT gadget.
2. ICT gadget are electronic, they require electricity to function, therefore you must have
access to electricity before you make use of them.
3. ICT can be used for job human beings are meant to do thereby causing loss of job among
people in the work force.
4. They are prone to damage and this could lead to loss of vital information stored in them.
5. They are prone to attack by hackers.
6. It threatens some areas of human endeavors
7. It affects peoples skills acquisition because many depends on it for their easy lives.
8. It brings about privacy.
WEEK THREE
INTERNET
b) Email: It refers to the messages sent electronically from one computer user to one or
more recipient through communication network such as the internet. It is the most
popular and widely used services on the internet today.
For an email message to be sent and received, the following must be in place: Mail
Server and mail client. To be able to send and receive email each user must have an email
address, which is unique to the user and consists of two part separated by @ symbol. The
first part is the user name, which can be a real name, that is the name of your ISP i.e
internet service provider. The general form of an email address is as follows:
c) World wide web: It is a huge set of inter linked documents, images and other resources,
linked by hyper links and URLs. These hyper links and URLs allow the web servers and
other machines that store, original copies of the resources to deliver them as required
using HTTP i.e Hyper Text Transfer Protocols which is one of the communication
protocols used in the internet.
d) Internet browser: It is a software program that enables internet users to browser or surf
the web. There are many internet browser available, but the following are the common or
popular ones internet explorer, Netscape navigator, mozillafirefox, Safari, Google
chrome etc.
e) Microsoft Internet Explorer: It is one of the web browser that access web page and allows
the user to navigate from one web to another via hyper links. It is a software application
used to locate web page.
f) Netscape: It introduces new plug in background colour for tables, the archive attribute
and the app. Element, The Netscape browser include the following: Version 1.0 through
4.8, 3.050, 7.0.
g) Mozilla: This internet browser implement most current web standards in addition to
several features. It runs on various versions of Linux Microsoft.
WEEK FOUR
Internet Environment
The following are found in the internet environment
In the internet environment, the internet explorer access the user to navigate from one place to
the other via hyperlink.
Also, web browser which is one of the software program, helps you to find, retrieve, views, send
hyper text and hyper media documents over the web.
User of Internet
i. Use to send and receive email
ii. Use for network group
iii. Use for surfing or chatting
iv. Use for research purposes
v. Use for shopping purposes
WEEK FIVE
Benefits of Internet
i. E-learning
ii. Information exchange
iii. Online Transaction
iv. E-entertainment
v. Search tools
vi. Fast and convenient
vii. Remove of barrier of distance.
Abuse of Internet
a. Malware
b. Hacking
c. Plagiarism
d. Piracy
e. Spamming
f. Fraud.
Electronic libraries
Electronic Report
Weather Forecast
Stock market report
Music, Video and pictures
Travel agencies
Multimedia Broadcast
Museum, Galleries, and their collection.
WEEK EIGHT
WEEK NINE
Computer Ethics
Ethics cover those actions that have serious consequences in the lives of others. These are the
sort of activities that you label right or wrong.
It is the set of principles and standards we use in dealing with what to do or situation that affects
other people.
WEEK TEN
Safety Measures
Since the needs for safety is so important, some of the safety measure to apply before and when
using a computer includes:
a) Sitting postures/postures: Here, the good postures should be applied to avoid back pain or
dislocation.
b) Use of anti glare protector: You have to position your monitor well to reduce the amount
of glare from both internal and external lighting. Use of anti glare protector reduces the
light rays that can affect the eye.
c) Proper positioning of monitor base: Your monitor should be elevated enough so that you
can comfortably view the screen without craving your neck up or down.
d) Illuminating the computer room: Computer room must be illuminated so as to avoid one
stepping on any electrical connection.
e) Maintaining a dust free environment because dust can bring about computer virus.
f) Keep liquid away from computer: Liquid substances such as water can damage the
computer system hardware when mistakenly poured on those physical components.
g) Protecting your computer from electrical damage prevent this damage, your computer
manufacturers strongly recommends the use of a high quality surge suppresser. Surge
suppresser regulates the flow of electricity to your computer equipment.