First Term I First Term Lesson Notes l First Term Mid Term Test l
EduDelightTutors First Term Examination
Quality Online Resources Second Term I Second Term Lesson Notes l Second Term Mid
for Teachers and Students Term Test l Second Term Examination
Third Term I Third Term Lesson Notes l Third Term Mid Term
Test l Third Term Examination
Join Us : WhatsApp l Telegram l Facebook l Mobile App l
YouTube l WhatsApp Channel
Download : Buy Materials I Download Schemes
Search this site... Search
Home FAQs About Us Contact Us Disclaimer Privacy Policy
SUBJECTS LINKS ! TERMLY SCHEME WITH LESSON NOTES !
TERMLY EXAMINATION QUESTIONS ! CLICK HERE TO DOWNLOAD OUR MOBILE APP
:
Home " JSS 2 " ICT "
JSS 2 THIRD TERM LESSON NOTE PLAN COMPUTER SCIENCE ICT
Trending Posts
JSS 2 THIRD TERM LESSON THIRD TERM LESSON
NOTE PLAN SCHEME OF
NOTE PLAN COMPUTER WORK FOR NURSERY, KG,
PRIMARY AND
SCIENCE ICT SECONDARY SCHOOLS
Week Topics
All Subjects Primary 2
Third Term Lesson Notes
1 Revision / Internet
2. Internet Browser All Subjects Primary 3
Third Term Lesson Notes
3. BeneBts of the Internet
4. Internet Environment All Subjects Primary 5
Third Term Lesson Notes
5 News Group
6. File sharing All Subjects Primary 4
Third Term Lesson Notes
7and 8 Computer ethic (ii)
9. Safety measures 1 All Subjects Primary 1
Third Term Lesson Notes
10. Safety measures 2
11. Revision Nursery 2 Lesson Notes
and Scheme of work For
Scheme of work for 3RD TERM Nursery 2 Third Term
WEEK : 1 REVISION All Subjects Kindergarten
Third Term Lesson Notes
CLASS : JSS TWO WEEK : 2 Lesson
INTERNET Towns and Settlements
in Nigeria
:
The global communication network that allows
All Subjects Primary 6
almost all computers worldwide to connect and
exchange information. It is a network of networks Third Term Lesson Notes
(largest computer network in the world!).
The internet could also be deBne as the collection of PROMOTED CONTENT
computers linked together to share information
worldwide.
RESOURCES PROVIDED BY THE INTERNET
1. E mail (Electronic mail): is a service provided by the
internet which allows users to send and receive mails via
A Simple Home Tip
the computers
For Impotence: Do
2. Gopher: this is system that allows the creation and use of This Twice A Day
directories of Bles on the computers on the internet and More...
build links that allows users to browse through the Bles.
689 172 230
3. File transfer protocol (FTP): this allows transfer of Bles
between host computer
4. Usenet: this allows automatic distribution of news
among thousands of user groups called news groups.
Recent Posts
5. Telnet: this allows a user to log in to a remote computer
and make use of it.
Harvest of Shame By
d. Web page: this is a document or resource of information
that is suitable for the World Wide Web and can be The Costly Mistake by
accessed through a web browser. Web pages are Chinelo Ifezulike: JSS3
accessed through their web address. Examples of web Quiz & Worksheet for
addresses are :
Literature Mastery
www.gooogle.com Housing – Meaning
(Types) and Acquisition
www.yahoo.com
of Houses Social Studies
www.facebook.com Primary 5 Third Term
Lesson Notes Week 1
2025 NCEE Timetable:
:
PROMOTED CONTENT Full Schedule for Unity
School Entrance Exam
Review and Revision
History Primary 5 Third
Term Lesson Notes
Week 1
Learn French Food
Names for JSS 2 (With
Fun Exercises)
Wife Wants 10 Rounds Of Sex? This Drink
Keeps You Ready! Kitchen Utensils in
French for JSS 2
More...
Students (Third Term)
447 112 149
Fun French Lesson for
Year 7: Talking About
1. Website : this is a collection of web pages ,just like a Leisure Activities
book with multiple pages.
2. Hyperlink : connects webs pages on the internet by using
Révision des Leçons et
text or images as a links to connect to other web pages Exercices Passés –
or sites . French Year 7 Third Term
3. World wide web (www) : is deBned as the global Week 1
information medium which users can read, write and
access information via the computers connected to the SS 1 FIRST TERM
internet. LESSON NOTE ENGLISH
GRAMMAR
INTERNET BROWSER
An internet browser, also known as a web browser or
simply a browser, is a software program that you use
to access the internet and view web pages on your
computer. You can think of your browser as your
gateway to the internet. A web browser is a computer
application software with which websites can be
:
viewed. PROMOTED CONTENT
Most Read Posts This Week
All Subjects Primary 1 First Term Lesson Notes
All Subjects JSS 2 First Term Lesson Notes
All Subjects Primary 2 First Term Lesson Notes
Examples of the internet browser include Your Prostate Will
Be Restored In 3
Days! Do This
Mozilla Firefox Every Night!
More...
Microsoft Internet Explorer
504 126 168
Apple safari
Google Chrome
Opera etc Category Posts
CREATING AN EMAIL ACCOUNT Select Category
Class Posts
Crating an email account allows you th have an email
address which can be used to send and receive mails NURSERY +
from friends and loved ones .some email accounts
are created with Yahoo mail, hotmail, MSN etc and KINDERGARTEN +
:
are free for internet users. LOWER PRIMARY +
To create a free account with Yahoo mail ,follow the UPPER PRIMARY +
steps below
JUNIOR SECONDARY +
1. Open the web browser and type www.yahoomail.com in SCHOOL
the address bar
2. On the Yahoo web page, click on Sign up SENIOR SECONDARY +
3. Fill in your personal data SCHOOL
4. Type in the proposed email address you want to use
EXAMINATION LINKS +
5. Type your password and retype your password to
conBrm. DOWNLOADABLES
d. Type the code shown in the registration window.
7. Click on create my account.
JOIN US ON WHATSAPP
JOIN US ON TELEGRAM
Examples of E-mail addresses
LIKE US ON FACEBOOK
Yahoo :[email protected]
EDU DELIGHT TUTORS
Google :[email protected]
QUIZ SECTION
Hotmail :[email protected]
IMPORTANT NOTICE
EXERCISE
1. DeBne the Internet
Translate Posts
2. State resources provided by the internet
Select Language
Usenet is a worldwide distributed discussion system Powered by Translate
available on the Internet. It allows users to read and
post messages in various categories called
newsgroups. Follow Us On
Facebook
:
[mediator_tech]
Edu Delight Tutors
2,901 followers
1. The Internet is a global __________ network.
a) communication
b) transportation
Follow Page
c) entertainment
d) Bnancial
2. The Internet is the largest __________ network in the Weekly Lesson Notes
world.
a) telephone First Term Weekly Lesson
b) television Notes
c) computer
d) transportation
Attain Financial freedom &Self-
discovery
3. The Internet allows computers worldwide to Free Financial freedom Blog & course
__________ information. Learn the secrets used by the Elites
https://consciousidentityy.com/
a) delete
b) exchange
c) encrypt Advertise Here
Your message can be seen by thousands
d) store
right here in just minutes. Click now!
www.StudAds.com
4. The collection of computers linked together to
share information worldwide is known as __________.
a) intranet Stud Ads - Advertise Here
b) extranet
c) internet
d) ethernet Edu Delight Tutors
5. __________ is a service provided by the Internet for About Us
sending and receiving electronic messages.
a) Bluetooth Contact Us
b) Ethernet
c) Email Disclaimer
d) SMS
FAQs
6. Gopher allows the creation and use of directories
of Bles on the Internet through __________. Privacy Policy
a) browsing
:
b) searching Terms of Service
c) linking
d) downloading
7. File Transfer Protocol (FTP) enables the __________
of Bles between host computers.
Stop swiping,
a) sharing
start…
b) editing connecting.
c) encryption
d) transfer
Search this site... Search
8. Usenet is a worldwide distributed __________
system. INTERESTING FOR YOU
a) messaging
b) gaming
c) Ble-sharing
d) shopping
Drink This
To Clean
9. The Internet Protocol (IP) is responsible for
The Blood
__________ data packets across the Internet. Zodiac’s Vessels
a) encrypting Best (and And Make
b) routing Worst) Blood
Wives— Pressure
c) deleting Are You 120/80
d) storing The
Ultimate
Couple?
eleavers.com
Make Money From
Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com
Ads by eLeavers.com
10. The World Wide Web (WWW) is an __________ of
:
interconnected documents and other resources.
a) archive
b) encyclopedia
c) infrastructure
d) network
11. The Internet allows users to access information
through __________.
a) books
b) magazines
c) websites
d) televisions
12. Web browsers are software applications used to
__________ websites.
a) develop
b) access
c) delete
d) encrypt
13. Hyperlinks are clickable elements on a webpage
that allow users to __________ to other pages.
a) download
b) search
c) link
d) navigate
14. The Internet Service Provider (ISP) is a company
that provides __________ access to the Internet.
a) cable
b) television
c) telephone
d) internet
15. The Internet is based on the __________ Protocol
Suite.
a) Transport
b) Network
:
c) Internet
d) Communication
16. A __________ is a unique identiBer assigned to
each device connected to the Internet.
a) domain name
b) IP address
c) URL
d) browser
17. Social media platforms such as Facebook and
Twitter are examples of __________ websites.
a) educational
b) e-commerce
c) social networking
d) news
18. Online banking and e-commerce are examples of
__________ services provided by the Internet.
a) communication
b) entertainment
c) Bnancial
d) transportation
19. The Internet allows for __________ collaboration
and communication.
a) local
b) national
c) international
d) orine
:
eleavers.com
Make Money From
Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com
Ads by eLeavers.com
20. Virtual private networks (VPNs) are used to
ensure __________ and secure Internet connections.
WEEK: THREE
BENEFITS OF THE INTERNET
The internet offers varieties of beneBts. These
includes
1. Communication / information exchange: with the internet
we are able to send and receive e-mails and exchange
vital information.
2. E-learning: – this stands for electronic learning which
could be deBned as the use of computer resources to
enhance learning.
3. E-entertainment : the internet can also be a source of
entertainment through playing of games ,music , online
videos etc
4. Fast and Cheaper Communication Service: the internet
minimizes distances and provides communication
services esciently and without little or no cost.
5. E-registration: – the internet provides examination
bodies, schools associations etc a simple, cost effective
registration service. Examples of such bodies are
:
WAEC,JAMB NECO etc.
d. E-commerce: thousand of businesses can be transacted
online with the use of the internet.
7. Research : researches can be made online at little or no
cost
t. Social Networking : the internet provide a service where
people can connect, chat and meet with various people
such as old friends,neigbours ,family members,friends
etc .
9. Political campaign: the internet is also used for political
campaign by the politicians.
10. Improving Productivity:most establishments now use the
internet as a tool for marketing their products and for
communication concerns which has helped business to
reduce costs thereby improving their productivity.
[mediator_tech]
INTERNET ABUSE
Internet abuse refers to improper use of the internet
and may include:
Computer crime, use of computers in criminal activity.
Cyber-bullying, use of the internet to bully and intimidate
Malware, software designed to harm a user’s computer,
including computer viruses
Spam (electronic), sending unwanted advertising
EXERCISE
1. State the beneBts of the internet
2. mention 3 internet absuses
:
Attain Financial freedom &Self-
discovery
Free Financial freedom Blog & course
Learn the secrets used by the Elites
https://consciousidentityy.com/
Advertise Here
Your message can be seen by thousands
right here in just minutes. Click now!
www.StudAds.com
Stud Ads - Advertise Here
WEEK FOUR
INTERNET ENVIRONMENT
An internet environment on a typical web browser
consists of the following common features
Back and forward Buttons : are used to move the web
pages back and forth
Refresh button : it reloads the current web page
Stop Button : it cancels the sloadving action of the
current web page.
Home Button : this is a cmmasnd button that is used to
return a user to the home page of the current website.
Addesss bar : is used to input web page addresses I.e
Uniform Resource identiBer (URI)
Search Bar : this is used to input terms into search
engine.
Status Bar : is used to display progress in loading the
resource and also the URI of hyperlinks when the cursor
hovers over them.
Menu Bar : contains list of menu used for maniplating
web browser and web pages.The web broswers may
contain menu options such as Hiastory and Bookmarks
which distinguish them from other GUI applications eg
:
Microsoft Word
USES OF THE INTERNET
The internet is used for
Sending and receiving emails
Chatting
EXERCISE
1. Describe the internet browser environment
2. State 3 uses of the internet
[mediator_tech]
INTERESTING FOR YOU
Your Prostate Will Be Restored In 3 Days!
Do This Every Night!
More...
593 148 198
:
PROMOTED CONTENT
Wife Wants 10 Rounds Of Sex? This Drink
Keeps You Ready!
More...
150 38 50
1. The internet allows us to send and receive
_______________.
a) letters
b) telegrams
c) e-mails
d) postcards
2. E-learning refers to the use of computer resources
to enhance _______________.
a) teaching
b) communication
c) entertainment
d) learning
3. Online videos and games are examples of
_______________.
a) e-commerce
b) e-registration
c) e-entertainment
d) e-learning
:
4. The internet minimizes distances and provides
_______________ communication services.
a) slow
b) expensive
c) fast
d) unreliable
5. WAEC and JAMB are examples of bodies that use
the internet for _______________.
a) research
b) social networking
c) e-commerce
d) e-registration
6. E-commerce allows thousands of businesses to be
transacted _______________.
a) orine
b) in person
c) over the phone
d) online
7. Online research can be conducted at
_______________ cost.
a) high
b) no
c) moderate
d) expensive
8. The internet provides a platform for _______________
where people can connect and chat.
a) political campaigns
b) e-learning
c) social networking
d) improving productivity
9. Political campaigns can be conducted using
_______________.
a) TV ads
:
b) radio ads
c) internet
d) billboards
10. Using the internet as a marketing tool helps
businesses _______________.
a) increase costs
b) decrease productivity
c) reduce costs
d) limit communication
eleavers.com
Make Money From
Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com
Ads by eLeavers.com
11. Communication and information exchange are
facilitated by _______________.
a) e-commerce
b) e-registration
c) social networking
d) the internet
12. The internet offers _______________
communication services.
a) expensive
b) slow
c) escient
d) unreliable
13. E-learning enhances learning through the use of
:
_______________.
a) textbooks
b) computers
c) televisions
d) radios
14. Playing games and listening to music online are
examples of _______________.
a) e-learning
b) e-entertainment
c) e-registration
d) e-commerce
15. The internet provides a cost-effective registration
service for _______________.
a) businesses
b) examination bodies
c) political parties
d) research institutes
16. Online research can be conducted with
_______________ cost.
a) high
b) no
c) moderate
d) expensive
17. Social networking allows people to connect with
_______________.
a) only family members
b) only old friends
c) various people
d) only neighbors
18. The internet is used for political campaigns by
_______________.
a) students
b) teachers
:
c) politicians
d) doctors
19. Using the internet as a marketing tool helps
businesses to improve _______________.
a) costs
b) productivity
c) communication
d) research
20. The internet provides a platform for
_______________ where people can chat and meet.
a) political campaigns
b) e-learning
c) social networking
d) improving productivity
[mediator_tech]
WEEK 5
NETWORK GROUPS
Mailing list
:
A mailing list is a collection of names and addresses
used by an individual or an organization to send
material to multiple recipients. On the Internet,
mailing lists include each person’s e-mail address .
The term is often extended to include the people
subscribed to such a list, so the group of subscribers
is referred to as “the mailing list”, or simply “the list”.
News Group
Same as forum, it is an on-line discussion group. On
the Internet, there are literally thousands of
newsgroups covering every conceivable interest.
Newsgroups are discussion groups. To read
messages posted to a particular newsgroup, you
must Brst subscribe to the newsgroup.
Newsgroup is an excellent way to share information,
to get answers, and to give your opinion to online
subjects.
A USENET SEARCH ENGINE
This is a service that searches through Usenet
newsgroups to Bnd speciBc content. Usenet search
engines can be used to search for anything. For
example, you might search for photos of a famous
person (such as Bill Gates)
If you want to search for regular, text-based articles,
the easiest way is to use the Google Groups Web site.
EXERCISE
DeBne the following terms
1. Mailing list
:
2. Newsgroup
[mediator_tech]
WEEK 6
FILE SHARING
File Sharing
Network Ble sharing is the process of copying data
Bles from one computer to another using a live
network connection.
Before the Internet and home networks became
popular, data Bles were often shared using yoppy
disks. Nowadays, some people still use CD-ROM /
DVD-ROM disks and USB sticks (Flash drives) for
transferring their photos and videos, but networks
give you more yexible options.
FTP File Transfers
This is a method of sharing Bles where a central
computer called the FTP server holds all the Bles to
be shared, while remote computers running FTP client
software can log in to the server to obtain copies.
P2P – Peer to Peer File Sharing
Peer to peer (P2P) Ble sharing is a popular method for
swapping large Bles on the Internet, particularly music
and videos. Unlike FTP, most P2P Ble sharing systems
do not use any central servers but instead allow all
computers on the network to function both as a client
and a server.
:
NETWORK
A computer network is a set of computers connected
together for the purpose of sharing information and
resources. Networks are used to provide easy access
to information, thus increasing productivity for users.
BeneRts of networking
There are three main beneBts of a network
File Sharing
In a computer network, one can view, modify, and
copy Bles stored on a different computer on the
network just as easily as if they were stored on your
computer.
Resource Sharing
Resources such as printers, fax machines, Storage
Devices (HDD, FDD and CD Drives), Webcam,
Scanners, Modem and many more devices can be
shared in a network.
Program Sharing
One can also share programs on a network. For
example programs such as Microsoft Osce, can be
shared by computers in the network.
Types of Networks
Local Area Networks
Local area network (LANs) is a type of network
connected within a very close geographic area, such
:
as a yoor of a building.
Metropolitan Area Networks
This is a large computer network which extends to a
city or town or a community.
Wide Area Networks
This is a computer network in which the computers
connected may be far apart. This network could exist
between a city and another city, or even between two
countries.
Intranet
An intranet is basically a network that is local to a
company. In other words, users from within this
company can Bnd all of their resources without
having to go outside of the company.
Extranet
An extranet is an extended intranet, where certain
internal services are made available to known
external users or business partners at remote
locations.
EXERCISE
1. DeBne Ble sharing
2. Explain the term Network
WEEK: 7-8
COMPUTER ETHICS II
RESPONSIBLE USE OF THE COMPUTER
:
Computer system is a valuable and expensive piece
of equipment that requires that must be properly
maintained. Therefore, the following rules should be
adhere to
1. Avoid liquid from coming in contact with the computer
system
2. Cover the system with transparent covers when not in
use to prevent dust from entering into them
3. Ensure that computers system are connected to properly
charged UPS systems to prevent them from damages
due to power surge or failures
4. Unplug the computer system from power source and all
electrical gadgets before leaving the osce at the end of
the day.
5. Food particle should not be allowed to penetrate the
keyboard.
d. Make use of surge protectors to prevent electric surge
from damaging the computers.
RESPONSIBLE USE OF THE INTERNET
1. Always endeavour to check your e-mail regularly
2. The content of your message may be received by another
person , so be mindful of your words and write
responsibly
3. Always spell check your messages before they are sent
4. Be mindful of the websites you visit, some sites are very
dubious waiting for victims; others contains
pornographic contents which is considered immoral in
the society .
5. Install Anti-Virus in your computer and avoid Ble
attachments from unknown sources to prevent virus
attacks
d. While chatting, be mindful of how you exchange
information about yourself .
:
MISUSE OF COMPUTERS AND THE INTERNET
Computers and the internet are misused by the users
in the following areas
1. Hacking: is an act of gaining unauthorized access to
computers. Anyone who does the act is called a Hacker.
2. Computer virus: virus are programs that damage our
Bles. A lot of viruses are contacted through the internet
by infected CDs , yash drives, Bcticious emails etc
3. Fraud : scam letters and false information are sent
through emails and mailing lists to fraudulently collect
money and other valuable items from innocent/ ignorant
person
4. Stealing (or Phishing ): internet criminals engage in
stealing vital information such as ATM card Pin, email
Password, username etc. from victim’s website , emails
and even personal computers .
5. Pornography: the internet is the medium for the
distribution of pornographic materials.
d. Cyber War : cyber war is the use of computers, the
internet and other devices to attack the enemies of
information system.
7. Piracy : this is use of computer to duplicate other
people’s work illegal especially CD, DVD , tapes , Blms,
software etc.
t. Plagiarism: this entails copying another person’s work
such as music , books, etc. without prior written
permission and presenting it as one’s work.
EXERCISES
What is Computer Ethics ?
WEEK: 9-10
SAFETY MEASURES
:
To protect the computer system and the computer
personnel, some safety measures must be taken and
they are as follows
1. Good sitting posture should be maintained ( i.e.) always
sit straight )
2. Anti-glare protector (monitor Blter) should be used to
protect the eyes.
3. The monitor should be positioned to the eye level to
avoid bending.
4. A computer room must be properly lit.
5. The computer environment must be clean and free from
dust.
d. Liquid should be avoided completely in the computer
system
7. There should be no beside the eating and drinking beside
the computer system
t. Computer system and peripherals should be arranged in
the computer room so as to allow free entry and free exit
9. The computer room should be air conditioned.
10. Unauthorized personnel should not be allowed into the
computer room.
[mediator_tech]
Internet The BeneBts and Abuse ICT Computer
Studies Jss 2 Third Term Week 3
ICT JSS 2 SECOND TERM EXAMINATION
Third Term Examinations JSS 2 ICT Computer
:
[mediator_tech]
.
:
THIRD TERM EXAMINATION
QUESTIONS FOR NURSERY 2
COMPUTER
Edu Delight Tutors SUBJECT:
HAND WRITING CLASS: NUR II
This is my TEACHER
___________________________________
___________________________________
___________________________________
___________________________________
___________________________________
___________________________________
SUBJECT: DRAWING CLASS: NUR II DRAW AND
COLOR A CHAIR Edu Delight Tutors LAGOS 3RD
TERM EXAMINATION CLASS: Nursery II
SUBJECT: Computer Studies INSTRUCTION: Fill
in the gap 1. The computer is used in … Continue
reading
EduDelightTutors
1. _______________ is an act of gaining unauthorized
access to computers.
a) Hacking
:
b) Phishing
c) Fraud
d) Plagiarism
2. Computer viruses are programs that
_______________.
a) protect our Bles
b) enhance computer performance
c) damage our Bles
d) improve internet speed
3. Fraudulent activities through emails and mailing
lists aim to _______________.
a) provide valuable information
b) collect money and valuable items
c) spread awareness
d) improve computer security
4. Stealing or phishing involves the unauthorized
collection of _______________.
a) ATM card PINs
b) email addresses
:
c) social media proBles
d) computer hardware
5. The distribution of pornographic materials is
facilitated through _______________.
a) computer viruses
b) phishing attacks
c) hacking
d) the internet
6. Cyber war involves using computers and the
internet to attack _______________.
a) innocent individuals
b) information systems
c) computer hardware
d) personal computers
7. Piracy refers to the illegal duplication of
_______________.
a) computer software
b) educational materials
c) personal documents
:
d) phone applications
8. Plagiarism involves copying someone else’s work
without _______________.
a) proper citation
b) permission
c) spell checking
d) encryption
9. Computer ethics refers to _______________.
a) responsible internet usage
b) computer programming
c) hacking techniques
d) ethical guidelines for computer use
10. Good sitting posture while using a computer
involves _______________.
a) slouching
b) leaning back
c) sitting straight
d) crossing legs
:
11. An anti-glare protector is used to protect the
_______________.
a) computer system
b) eyes
c) keyboard
d) monitor
12. Positioning the monitor at eye level helps to avoid
_______________.
a) bending
b) eye strain
c) neck pain
d) computer viruses
13. A computer room should be properly
_______________.
a) ventilated
b) decorated
c) lit
d) locked
:
14. To maintain a clean computer environment, it
should be free from _______________.
a) liquid
b) dust
c) heat
d) noise
15. Eating and drinking should be avoided
_______________.
a) outside the computer room
b) near the computer system
c) during computer breaks
d) during computer maintenance
16. Proper arrangement of computer systems allows
for _______________.
a) restricted access
b) better security
c) free entry and exit
d) increased productivity
17. The computer room should be _______________.
:
a) soundproof
b) air conditioned
c) dark
d) crowded
18. Unauthorized personnel should not be allowed
_______________.
a) into the computer room
b) to use the internet
c) to access social media
d) to operate the computer system
19. Checking emails regularly is a responsible
_______________.
a) safety measure
b) internet usage
c) computer maintenance activity
d) ethical guideline
20. Before sending messages, it is important to
_______________.
a) check the weather forecast
:
b) spell check
c) delete old emails
d) install antivirus software
[mediator_tech]
Related Posts:
1. Peopleware: The Human Element of Computing
Computer Studies JSS 2 First Term Lesson Notes Week
5
2. All Subjects JSS 2 Third Term Lesson Notes
3. Third Term Examinations JSS 2 ICT Computer
4. Various Units of Storage and Their Values Computer
Studies JSS 2 First Term Lesson Notes Week 11
5. BASIC PROGRAMMING LANGUAGE
d. Sizes, Generation, Degree of Versatility, Types and
ClassiXcation of Computers Computer Studies JSS 2
First Term Lesson Notes Week 1
7. Components of Computer System – Hardware,
Software, Peopleware Computer Studies JSS 2 First
Term Lesson Notes Week 2
t. JSS 2 THIRD TERM LESSON NOTE PLAN FRENCH
LANGUAGE
9. JSS 2 THIRD TERM LESSON NOTE PLAN CULTURAL
AND CREATIVE ARTS
10. JSS 2 THIRD TERM ENGLISH LANGUAGE LESSON NOTE
:
PROMOTED CONTENT
Sex Will Last About 3 Hours! Just Do This
Before Bed!
More...
449 112 150
Tags: Jss 2 Third Term Lesson
Related Posts
Basic Farm
Science Structures
Exams Agricultural
Questions Science JSS HUMAN
JSS 2 2 Second TRAFFICKING
SECOND Term Lesson
TERM Notes
About The Author
Edu Delight Tutors
Am a dedicated educator with a passion for learning
and a keen interest in technology. I believe that
:
technology can revolutionize
education and am committed to
creating an online hub of knowledge,
inspiration, and growth for both
educators and students. Welcome to
Edu Delight Tutors, where learning knows no
boundaries.
Meet someone
who gets you. St…
building your love
FIRST TERM SECOND TERM THIRD TERM
FIRST TERM LESSON SECOND TERM LESSON THIRD TERM LESSON
NOTE PLAN SCHEME OF NOTE PLAN SCHEME OF NOTE PLAN SCHEME OF
WORK FOR NURSERY, KG, WORK FOR NURSERY, KG, WORK FOR NURSERY, KG,
PRIMARY AND PRIMARY AND PRIMARY AND
SECONDARY SCHOOLS SECONDARY SCHOOLS SECONDARY SCHOOLS
FIRST TERM MID TERM SECOND TERM MID TERM THIRD TERM MID TERM
TEST FOR NURSERY, KG, TEST FOR NURSERY, KG, TEST FOR NURSERY, KG,
PRIMARY AND PRIMARY AND PRIMARY AND
SECONDARY SCHOOLS SECONDARY SCHOOLS SECONDARY SCHOOLS
FIRST TERM SECOND TERM THIRD TERM
EXAMINATION FOR EXAMINATION FOR PROMOTIONAL
NURSERY, KG, PRIMARY NURSERY, KG, PRIMARY EXAMINATION FOR
AND SECONDARY AND SECONDARY NURSERY, KG, PRIMARY
SCHOOLS SCHOOLS AND SECONDARY
:
SCHOOLS
Copyright © 2025 | Edu Delight Tutors Back to Top ↑
PROMOTED CONTENT
Drink This To Clean Blood Vessels And Make Blood
Pressure 120/80
More...
479 120 160
: