0% found this document useful (0 votes)
43 views38 pages

Year 8 Ict Third Term

The document outlines lesson plans and resources for various educational terms, focusing on ICT for JSS 2 students. It includes topics such as internet usage, benefits, and safety measures, along with exercises and examples of email account creation. Additionally, it discusses the internet environment and its applications in communication and learning.

Uploaded by

jbenedict230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views38 pages

Year 8 Ict Third Term

The document outlines lesson plans and resources for various educational terms, focusing on ICT for JSS 2 students. It includes topics such as internet usage, benefits, and safety measures, along with exercises and examples of email account creation. Additionally, it discusses the internet environment and its applications in communication and learning.

Uploaded by

jbenedict230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

First Term I First Term Lesson Notes l First Term Mid Term Test l

EduDelightTutors First Term Examination

Quality Online Resources Second Term I Second Term Lesson Notes l Second Term Mid
for Teachers and Students Term Test l Second Term Examination

Third Term I Third Term Lesson Notes l Third Term Mid Term
Test l Third Term Examination

Join Us : WhatsApp l Telegram l Facebook l Mobile App l


YouTube l WhatsApp Channel

Download : Buy Materials I Download Schemes

Search this site... Search

Home FAQs About Us Contact Us Disclaimer Privacy Policy

SUBJECTS LINKS ! TERMLY SCHEME WITH LESSON NOTES !

TERMLY EXAMINATION QUESTIONS ! CLICK HERE TO DOWNLOAD OUR MOBILE APP


:
Home " JSS 2 " ICT "
JSS 2 THIRD TERM LESSON NOTE PLAN COMPUTER SCIENCE ICT
Trending Posts

JSS 2 THIRD TERM LESSON THIRD TERM LESSON


NOTE PLAN SCHEME OF
NOTE PLAN COMPUTER WORK FOR NURSERY, KG,
PRIMARY AND
SCIENCE ICT SECONDARY SCHOOLS

Week Topics
All Subjects Primary 2
Third Term Lesson Notes
1 Revision / Internet

2. Internet Browser All Subjects Primary 3


Third Term Lesson Notes
3. BeneBts of the Internet

4. Internet Environment All Subjects Primary 5


Third Term Lesson Notes
5 News Group

6. File sharing All Subjects Primary 4


Third Term Lesson Notes
7and 8 Computer ethic (ii)

9. Safety measures 1 All Subjects Primary 1


Third Term Lesson Notes
10. Safety measures 2

11. Revision Nursery 2 Lesson Notes


and Scheme of work For
Scheme of work for 3RD TERM Nursery 2 Third Term

WEEK : 1 REVISION All Subjects Kindergarten


Third Term Lesson Notes
CLASS : JSS TWO WEEK : 2 Lesson

INTERNET Towns and Settlements


in Nigeria
:
The global communication network that allows
All Subjects Primary 6
almost all computers worldwide to connect and
exchange information. It is a network of networks Third Term Lesson Notes
(largest computer network in the world!).

The internet could also be deBne as the collection of PROMOTED CONTENT


computers linked together to share information
worldwide.

RESOURCES PROVIDED BY THE INTERNET

1. E mail (Electronic mail): is a service provided by the


internet which allows users to send and receive mails via
A Simple Home Tip
the computers
For Impotence: Do
2. Gopher: this is system that allows the creation and use of This Twice A Day
directories of Bles on the computers on the internet and More...
build links that allows users to browse through the Bles.
689 172 230
3. File transfer protocol (FTP): this allows transfer of Bles
between host computer
4. Usenet: this allows automatic distribution of news
among thousands of user groups called news groups.
Recent Posts
5. Telnet: this allows a user to log in to a remote computer
and make use of it.
Harvest of Shame By
d. Web page: this is a document or resource of information
that is suitable for the World Wide Web and can be The Costly Mistake by
accessed through a web browser. Web pages are Chinelo Ifezulike: JSS3
accessed through their web address. Examples of web Quiz & Worksheet for
addresses are :
Literature Mastery

www.gooogle.com Housing – Meaning


(Types) and Acquisition
www.yahoo.com
of Houses Social Studies
www.facebook.com Primary 5 Third Term
Lesson Notes Week 1

2025 NCEE Timetable:


:
PROMOTED CONTENT Full Schedule for Unity
School Entrance Exam

Review and Revision


History Primary 5 Third
Term Lesson Notes
Week 1

Learn French Food


Names for JSS 2 (With
Fun Exercises)
Wife Wants 10 Rounds Of Sex? This Drink
Keeps You Ready! Kitchen Utensils in
French for JSS 2
More...
Students (Third Term)
447 112 149
Fun French Lesson for
Year 7: Talking About
1. Website : this is a collection of web pages ,just like a Leisure Activities
book with multiple pages.
2. Hyperlink : connects webs pages on the internet by using
Révision des Leçons et
text or images as a links to connect to other web pages Exercices Passés –
or sites . French Year 7 Third Term
3. World wide web (www) : is deBned as the global Week 1
information medium which users can read, write and
access information via the computers connected to the SS 1 FIRST TERM
internet. LESSON NOTE ENGLISH
GRAMMAR
INTERNET BROWSER

An internet browser, also known as a web browser or


simply a browser, is a software program that you use
to access the internet and view web pages on your
computer. You can think of your browser as your
gateway to the internet. A web browser is a computer
application software with which websites can be
:
viewed. PROMOTED CONTENT

Most Read Posts This Week

All Subjects Primary 1 First Term Lesson Notes


All Subjects JSS 2 First Term Lesson Notes
All Subjects Primary 2 First Term Lesson Notes

Examples of the internet browser include Your Prostate Will


Be Restored In 3
Days! Do This
Mozilla Firefox Every Night!
More...
Microsoft Internet Explorer
504 126 168
Apple safari

Google Chrome

Opera etc Category Posts

CREATING AN EMAIL ACCOUNT Select Category

Class Posts
Crating an email account allows you th have an email
address which can be used to send and receive mails NURSERY +
from friends and loved ones .some email accounts
are created with Yahoo mail, hotmail, MSN etc and KINDERGARTEN +
:
are free for internet users. LOWER PRIMARY +

To create a free account with Yahoo mail ,follow the UPPER PRIMARY +
steps below
JUNIOR SECONDARY +
1. Open the web browser and type www.yahoomail.com in SCHOOL
the address bar
2. On the Yahoo web page, click on Sign up SENIOR SECONDARY +
3. Fill in your personal data SCHOOL
4. Type in the proposed email address you want to use
EXAMINATION LINKS +
5. Type your password and retype your password to
conBrm. DOWNLOADABLES
d. Type the code shown in the registration window.
7. Click on create my account.
JOIN US ON WHATSAPP

JOIN US ON TELEGRAM
Examples of E-mail addresses
LIKE US ON FACEBOOK
Yahoo :[email protected]
EDU DELIGHT TUTORS
Google :[email protected]
QUIZ SECTION
Hotmail :[email protected]
IMPORTANT NOTICE
EXERCISE

1. DeBne the Internet


Translate Posts
2. State resources provided by the internet
Select Language

Usenet is a worldwide distributed discussion system Powered by Translate


available on the Internet. It allows users to read and
post messages in various categories called
newsgroups. Follow Us On
Facebook
:
[mediator_tech]
Edu Delight Tutors
2,901 followers
1. The Internet is a global __________ network.
a) communication
b) transportation
Follow Page
c) entertainment
d) Bnancial

2. The Internet is the largest __________ network in the Weekly Lesson Notes
world.
a) telephone First Term Weekly Lesson
b) television Notes
c) computer
d) transportation
Attain Financial freedom &Self-
discovery
3. The Internet allows computers worldwide to Free Financial freedom Blog & course
__________ information. Learn the secrets used by the Elites
https://consciousidentityy.com/
a) delete
b) exchange
c) encrypt Advertise Here
Your message can be seen by thousands
d) store
right here in just minutes. Click now!
www.StudAds.com
4. The collection of computers linked together to
share information worldwide is known as __________.
a) intranet Stud Ads - Advertise Here
b) extranet
c) internet
d) ethernet Edu Delight Tutors
5. __________ is a service provided by the Internet for About Us
sending and receiving electronic messages.
a) Bluetooth Contact Us
b) Ethernet
c) Email Disclaimer
d) SMS
FAQs
6. Gopher allows the creation and use of directories
of Bles on the Internet through __________. Privacy Policy
a) browsing
:
b) searching Terms of Service
c) linking
d) downloading

7. File Transfer Protocol (FTP) enables the __________


of Bles between host computers.
Stop swiping,
a) sharing
start…
b) editing connecting.
c) encryption
d) transfer
Search this site... Search

8. Usenet is a worldwide distributed __________


system. INTERESTING FOR YOU
a) messaging
b) gaming
c) Ble-sharing
d) shopping
Drink This
To Clean
9. The Internet Protocol (IP) is responsible for
The Blood
__________ data packets across the Internet. Zodiac’s Vessels
a) encrypting Best (and And Make
b) routing Worst) Blood
Wives— Pressure
c) deleting Are You 120/80
d) storing The
Ultimate
Couple?

eleavers.com

Make Money From


Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com

Ads by eLeavers.com

10. The World Wide Web (WWW) is an __________ of


:
interconnected documents and other resources.
a) archive
b) encyclopedia
c) infrastructure
d) network

11. The Internet allows users to access information


through __________.
a) books
b) magazines
c) websites
d) televisions

12. Web browsers are software applications used to


__________ websites.
a) develop
b) access
c) delete
d) encrypt

13. Hyperlinks are clickable elements on a webpage


that allow users to __________ to other pages.
a) download
b) search
c) link
d) navigate

14. The Internet Service Provider (ISP) is a company


that provides __________ access to the Internet.
a) cable
b) television
c) telephone
d) internet

15. The Internet is based on the __________ Protocol


Suite.
a) Transport
b) Network
:
c) Internet
d) Communication

16. A __________ is a unique identiBer assigned to


each device connected to the Internet.
a) domain name
b) IP address
c) URL
d) browser

17. Social media platforms such as Facebook and


Twitter are examples of __________ websites.
a) educational
b) e-commerce
c) social networking
d) news

18. Online banking and e-commerce are examples of


__________ services provided by the Internet.
a) communication
b) entertainment
c) Bnancial
d) transportation

19. The Internet allows for __________ collaboration


and communication.
a) local
b) national
c) international
d) orine
:
eleavers.com

Make Money From


Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com

Ads by eLeavers.com

20. Virtual private networks (VPNs) are used to


ensure __________ and secure Internet connections.

WEEK: THREE

BENEFITS OF THE INTERNET

The internet offers varieties of beneBts. These


includes

1. Communication / information exchange: with the internet


we are able to send and receive e-mails and exchange
vital information.
2. E-learning: – this stands for electronic learning which
could be deBned as the use of computer resources to
enhance learning.
3. E-entertainment : the internet can also be a source of
entertainment through playing of games ,music , online
videos etc
4. Fast and Cheaper Communication Service: the internet
minimizes distances and provides communication
services esciently and without little or no cost.
5. E-registration: – the internet provides examination
bodies, schools associations etc a simple, cost effective
registration service. Examples of such bodies are
:
WAEC,JAMB NECO etc.
d. E-commerce: thousand of businesses can be transacted
online with the use of the internet.
7. Research : researches can be made online at little or no
cost
t. Social Networking : the internet provide a service where
people can connect, chat and meet with various people
such as old friends,neigbours ,family members,friends
etc .
9. Political campaign: the internet is also used for political
campaign by the politicians.
10. Improving Productivity:most establishments now use the
internet as a tool for marketing their products and for
communication concerns which has helped business to
reduce costs thereby improving their productivity.

[mediator_tech]

INTERNET ABUSE

Internet abuse refers to improper use of the internet


and may include:

Computer crime, use of computers in criminal activity.


Cyber-bullying, use of the internet to bully and intimidate
Malware, software designed to harm a user’s computer,
including computer viruses
Spam (electronic), sending unwanted advertising

EXERCISE

1. State the beneBts of the internet

2. mention 3 internet absuses


:
Attain Financial freedom &Self-
discovery
Free Financial freedom Blog & course
Learn the secrets used by the Elites
https://consciousidentityy.com/

Advertise Here
Your message can be seen by thousands
right here in just minutes. Click now!
www.StudAds.com

Stud Ads - Advertise Here

WEEK FOUR

INTERNET ENVIRONMENT

An internet environment on a typical web browser


consists of the following common features

Back and forward Buttons : are used to move the web


pages back and forth
Refresh button : it reloads the current web page
Stop Button : it cancels the sloadving action of the
current web page.
Home Button : this is a cmmasnd button that is used to
return a user to the home page of the current website.
Addesss bar : is used to input web page addresses I.e
Uniform Resource identiBer (URI)
Search Bar : this is used to input terms into search
engine.
Status Bar : is used to display progress in loading the
resource and also the URI of hyperlinks when the cursor
hovers over them.
Menu Bar : contains list of menu used for maniplating
web browser and web pages.The web broswers may
contain menu options such as Hiastory and Bookmarks
which distinguish them from other GUI applications eg
:
Microsoft Word

USES OF THE INTERNET

The internet is used for

Sending and receiving emails


Chatting

EXERCISE

1. Describe the internet browser environment

2. State 3 uses of the internet

[mediator_tech]

INTERESTING FOR YOU

Your Prostate Will Be Restored In 3 Days!


Do This Every Night!
More...

593 148 198


:
PROMOTED CONTENT

Wife Wants 10 Rounds Of Sex? This Drink


Keeps You Ready!
More...

150 38 50

1. The internet allows us to send and receive


_______________.
a) letters
b) telegrams
c) e-mails
d) postcards

2. E-learning refers to the use of computer resources


to enhance _______________.
a) teaching
b) communication
c) entertainment
d) learning

3. Online videos and games are examples of


_______________.
a) e-commerce
b) e-registration
c) e-entertainment
d) e-learning
:
4. The internet minimizes distances and provides
_______________ communication services.
a) slow
b) expensive
c) fast
d) unreliable

5. WAEC and JAMB are examples of bodies that use


the internet for _______________.
a) research
b) social networking
c) e-commerce
d) e-registration

6. E-commerce allows thousands of businesses to be


transacted _______________.
a) orine
b) in person
c) over the phone
d) online

7. Online research can be conducted at


_______________ cost.
a) high
b) no
c) moderate
d) expensive

8. The internet provides a platform for _______________


where people can connect and chat.
a) political campaigns
b) e-learning
c) social networking
d) improving productivity

9. Political campaigns can be conducted using


_______________.
a) TV ads
:
b) radio ads
c) internet
d) billboards

10. Using the internet as a marketing tool helps


businesses _______________.
a) increase costs
b) decrease productivity
c) reduce costs
d) limit communication

eleavers.com

Make Money From


Your Website Or Blog
Sign up as Publisher
with us Display our Ads
in your website and
make BIG MONEY!
eLeavers.com

Ads by eLeavers.com

11. Communication and information exchange are


facilitated by _______________.
a) e-commerce
b) e-registration
c) social networking
d) the internet

12. The internet offers _______________


communication services.
a) expensive
b) slow
c) escient
d) unreliable

13. E-learning enhances learning through the use of


:
_______________.
a) textbooks
b) computers
c) televisions
d) radios

14. Playing games and listening to music online are


examples of _______________.
a) e-learning
b) e-entertainment
c) e-registration
d) e-commerce

15. The internet provides a cost-effective registration


service for _______________.
a) businesses
b) examination bodies
c) political parties
d) research institutes

16. Online research can be conducted with


_______________ cost.
a) high
b) no
c) moderate
d) expensive

17. Social networking allows people to connect with


_______________.
a) only family members
b) only old friends
c) various people
d) only neighbors

18. The internet is used for political campaigns by


_______________.
a) students
b) teachers
:
c) politicians
d) doctors

19. Using the internet as a marketing tool helps


businesses to improve _______________.
a) costs
b) productivity
c) communication
d) research

20. The internet provides a platform for


_______________ where people can chat and meet.
a) political campaigns
b) e-learning
c) social networking
d) improving productivity

[mediator_tech]

WEEK 5

NETWORK GROUPS

Mailing list
:
A mailing list is a collection of names and addresses
used by an individual or an organization to send
material to multiple recipients. On the Internet,
mailing lists include each person’s e-mail address .
The term is often extended to include the people
subscribed to such a list, so the group of subscribers
is referred to as “the mailing list”, or simply “the list”.

News Group

Same as forum, it is an on-line discussion group. On


the Internet, there are literally thousands of
newsgroups covering every conceivable interest.

Newsgroups are discussion groups. To read


messages posted to a particular newsgroup, you
must Brst subscribe to the newsgroup.

Newsgroup is an excellent way to share information,


to get answers, and to give your opinion to online
subjects.

A USENET SEARCH ENGINE

This is a service that searches through Usenet


newsgroups to Bnd speciBc content. Usenet search
engines can be used to search for anything. For
example, you might search for photos of a famous
person (such as Bill Gates)

If you want to search for regular, text-based articles,


the easiest way is to use the Google Groups Web site.

EXERCISE

DeBne the following terms

1. Mailing list
:
2. Newsgroup

[mediator_tech]

WEEK 6

FILE SHARING

File Sharing

Network Ble sharing is the process of copying data


Bles from one computer to another using a live
network connection.

Before the Internet and home networks became


popular, data Bles were often shared using yoppy
disks. Nowadays, some people still use CD-ROM /
DVD-ROM disks and USB sticks (Flash drives) for
transferring their photos and videos, but networks
give you more yexible options.

FTP File Transfers

This is a method of sharing Bles where a central


computer called the FTP server holds all the Bles to
be shared, while remote computers running FTP client
software can log in to the server to obtain copies.

P2P – Peer to Peer File Sharing

Peer to peer (P2P) Ble sharing is a popular method for


swapping large Bles on the Internet, particularly music
and videos. Unlike FTP, most P2P Ble sharing systems
do not use any central servers but instead allow all
computers on the network to function both as a client
and a server.
:
NETWORK

A computer network is a set of computers connected


together for the purpose of sharing information and
resources. Networks are used to provide easy access
to information, thus increasing productivity for users.

BeneRts of networking

There are three main beneBts of a network

File Sharing

In a computer network, one can view, modify, and


copy Bles stored on a different computer on the
network just as easily as if they were stored on your
computer.

Resource Sharing

Resources such as printers, fax machines, Storage


Devices (HDD, FDD and CD Drives), Webcam,
Scanners, Modem and many more devices can be
shared in a network.

Program Sharing

One can also share programs on a network. For


example programs such as Microsoft Osce, can be
shared by computers in the network.

Types of Networks

Local Area Networks

Local area network (LANs) is a type of network


connected within a very close geographic area, such
:
as a yoor of a building.

Metropolitan Area Networks

This is a large computer network which extends to a


city or town or a community.

Wide Area Networks

This is a computer network in which the computers


connected may be far apart. This network could exist
between a city and another city, or even between two
countries.

Intranet

An intranet is basically a network that is local to a


company. In other words, users from within this
company can Bnd all of their resources without
having to go outside of the company.

Extranet

An extranet is an extended intranet, where certain


internal services are made available to known
external users or business partners at remote
locations.

EXERCISE

1. DeBne Ble sharing

2. Explain the term Network

WEEK: 7-8

COMPUTER ETHICS II

RESPONSIBLE USE OF THE COMPUTER


:
Computer system is a valuable and expensive piece
of equipment that requires that must be properly
maintained. Therefore, the following rules should be
adhere to

1. Avoid liquid from coming in contact with the computer


system
2. Cover the system with transparent covers when not in
use to prevent dust from entering into them
3. Ensure that computers system are connected to properly
charged UPS systems to prevent them from damages
due to power surge or failures
4. Unplug the computer system from power source and all
electrical gadgets before leaving the osce at the end of
the day.
5. Food particle should not be allowed to penetrate the
keyboard.
d. Make use of surge protectors to prevent electric surge
from damaging the computers.

RESPONSIBLE USE OF THE INTERNET

1. Always endeavour to check your e-mail regularly


2. The content of your message may be received by another
person , so be mindful of your words and write
responsibly
3. Always spell check your messages before they are sent
4. Be mindful of the websites you visit, some sites are very
dubious waiting for victims; others contains
pornographic contents which is considered immoral in
the society .
5. Install Anti-Virus in your computer and avoid Ble
attachments from unknown sources to prevent virus
attacks
d. While chatting, be mindful of how you exchange
information about yourself .
:
MISUSE OF COMPUTERS AND THE INTERNET

Computers and the internet are misused by the users


in the following areas

1. Hacking: is an act of gaining unauthorized access to


computers. Anyone who does the act is called a Hacker.
2. Computer virus: virus are programs that damage our
Bles. A lot of viruses are contacted through the internet
by infected CDs , yash drives, Bcticious emails etc
3. Fraud : scam letters and false information are sent
through emails and mailing lists to fraudulently collect
money and other valuable items from innocent/ ignorant
person
4. Stealing (or Phishing ): internet criminals engage in
stealing vital information such as ATM card Pin, email
Password, username etc. from victim’s website , emails
and even personal computers .
5. Pornography: the internet is the medium for the
distribution of pornographic materials.
d. Cyber War : cyber war is the use of computers, the
internet and other devices to attack the enemies of
information system.
7. Piracy : this is use of computer to duplicate other
people’s work illegal especially CD, DVD , tapes , Blms,
software etc.
t. Plagiarism: this entails copying another person’s work
such as music , books, etc. without prior written
permission and presenting it as one’s work.

EXERCISES

What is Computer Ethics ?

WEEK: 9-10

SAFETY MEASURES
:
To protect the computer system and the computer
personnel, some safety measures must be taken and
they are as follows

1. Good sitting posture should be maintained ( i.e.) always


sit straight )
2. Anti-glare protector (monitor Blter) should be used to
protect the eyes.
3. The monitor should be positioned to the eye level to
avoid bending.
4. A computer room must be properly lit.
5. The computer environment must be clean and free from
dust.
d. Liquid should be avoided completely in the computer
system
7. There should be no beside the eating and drinking beside
the computer system
t. Computer system and peripherals should be arranged in
the computer room so as to allow free entry and free exit
9. The computer room should be air conditioned.
10. Unauthorized personnel should not be allowed into the
computer room.

[mediator_tech]

Internet The BeneBts and Abuse ICT Computer


Studies Jss 2 Third Term Week 3

ICT JSS 2 SECOND TERM EXAMINATION

Third Term Examinations JSS 2 ICT Computer


:
[mediator_tech]

.
:
THIRD TERM EXAMINATION
QUESTIONS FOR NURSERY 2
COMPUTER
Edu Delight Tutors SUBJECT:
HAND WRITING CLASS: NUR II
This is my TEACHER

___________________________________
___________________________________
___________________________________
___________________________________
___________________________________
___________________________________
SUBJECT: DRAWING CLASS: NUR II DRAW AND
COLOR A CHAIR Edu Delight Tutors LAGOS 3RD
TERM EXAMINATION CLASS: Nursery II
SUBJECT: Computer Studies INSTRUCTION: Fill
in the gap 1. The computer is used in … Continue
reading

EduDelightTutors

1. _______________ is an act of gaining unauthorized


access to computers.

a) Hacking
:
b) Phishing

c) Fraud

d) Plagiarism

2. Computer viruses are programs that


_______________.

a) protect our Bles

b) enhance computer performance

c) damage our Bles

d) improve internet speed

3. Fraudulent activities through emails and mailing


lists aim to _______________.

a) provide valuable information

b) collect money and valuable items

c) spread awareness

d) improve computer security

4. Stealing or phishing involves the unauthorized


collection of _______________.

a) ATM card PINs

b) email addresses
:
c) social media proBles

d) computer hardware

5. The distribution of pornographic materials is


facilitated through _______________.

a) computer viruses

b) phishing attacks

c) hacking

d) the internet

6. Cyber war involves using computers and the


internet to attack _______________.

a) innocent individuals

b) information systems

c) computer hardware

d) personal computers

7. Piracy refers to the illegal duplication of


_______________.

a) computer software

b) educational materials

c) personal documents
:
d) phone applications

8. Plagiarism involves copying someone else’s work


without _______________.

a) proper citation

b) permission

c) spell checking

d) encryption

9. Computer ethics refers to _______________.

a) responsible internet usage

b) computer programming

c) hacking techniques

d) ethical guidelines for computer use

10. Good sitting posture while using a computer


involves _______________.

a) slouching

b) leaning back

c) sitting straight

d) crossing legs
:
11. An anti-glare protector is used to protect the
_______________.

a) computer system

b) eyes

c) keyboard

d) monitor

12. Positioning the monitor at eye level helps to avoid


_______________.

a) bending

b) eye strain

c) neck pain

d) computer viruses

13. A computer room should be properly


_______________.

a) ventilated

b) decorated

c) lit

d) locked
:
14. To maintain a clean computer environment, it
should be free from _______________.

a) liquid

b) dust

c) heat

d) noise

15. Eating and drinking should be avoided


_______________.

a) outside the computer room

b) near the computer system

c) during computer breaks

d) during computer maintenance

16. Proper arrangement of computer systems allows


for _______________.

a) restricted access

b) better security

c) free entry and exit

d) increased productivity

17. The computer room should be _______________.


:
a) soundproof

b) air conditioned

c) dark

d) crowded

18. Unauthorized personnel should not be allowed


_______________.

a) into the computer room

b) to use the internet

c) to access social media

d) to operate the computer system

19. Checking emails regularly is a responsible


_______________.

a) safety measure

b) internet usage

c) computer maintenance activity

d) ethical guideline

20. Before sending messages, it is important to


_______________.

a) check the weather forecast


:
b) spell check

c) delete old emails

d) install antivirus software

[mediator_tech]

Related Posts:

1. Peopleware: The Human Element of Computing


Computer Studies JSS 2 First Term Lesson Notes Week
5
2. All Subjects JSS 2 Third Term Lesson Notes
3. Third Term Examinations JSS 2 ICT Computer
4. Various Units of Storage and Their Values Computer
Studies JSS 2 First Term Lesson Notes Week 11
5. BASIC PROGRAMMING LANGUAGE
d. Sizes, Generation, Degree of Versatility, Types and
ClassiXcation of Computers Computer Studies JSS 2
First Term Lesson Notes Week 1
7. Components of Computer System – Hardware,
Software, Peopleware Computer Studies JSS 2 First
Term Lesson Notes Week 2
t. JSS 2 THIRD TERM LESSON NOTE PLAN FRENCH
LANGUAGE
9. JSS 2 THIRD TERM LESSON NOTE PLAN CULTURAL
AND CREATIVE ARTS
10. JSS 2 THIRD TERM ENGLISH LANGUAGE LESSON NOTE
:
PROMOTED CONTENT

Sex Will Last About 3 Hours! Just Do This


Before Bed!
More...

449 112 150

Tags: Jss 2 Third Term Lesson

Related Posts

Basic Farm
Science Structures
Exams Agricultural
Questions Science JSS HUMAN
JSS 2 2 Second TRAFFICKING
SECOND Term Lesson
TERM Notes

About The Author


Edu Delight Tutors
Am a dedicated educator with a passion for learning
and a keen interest in technology. I believe that
:
technology can revolutionize
education and am committed to
creating an online hub of knowledge,
inspiration, and growth for both
educators and students. Welcome to
Edu Delight Tutors, where learning knows no
boundaries.

Meet someone
who gets you. St…
building your love

FIRST TERM SECOND TERM THIRD TERM

FIRST TERM LESSON SECOND TERM LESSON THIRD TERM LESSON


NOTE PLAN SCHEME OF NOTE PLAN SCHEME OF NOTE PLAN SCHEME OF
WORK FOR NURSERY, KG, WORK FOR NURSERY, KG, WORK FOR NURSERY, KG,
PRIMARY AND PRIMARY AND PRIMARY AND
SECONDARY SCHOOLS SECONDARY SCHOOLS SECONDARY SCHOOLS

FIRST TERM MID TERM SECOND TERM MID TERM THIRD TERM MID TERM
TEST FOR NURSERY, KG, TEST FOR NURSERY, KG, TEST FOR NURSERY, KG,
PRIMARY AND PRIMARY AND PRIMARY AND
SECONDARY SCHOOLS SECONDARY SCHOOLS SECONDARY SCHOOLS

FIRST TERM SECOND TERM THIRD TERM


EXAMINATION FOR EXAMINATION FOR PROMOTIONAL
NURSERY, KG, PRIMARY NURSERY, KG, PRIMARY EXAMINATION FOR
AND SECONDARY AND SECONDARY NURSERY, KG, PRIMARY
SCHOOLS SCHOOLS AND SECONDARY
:
SCHOOLS

Copyright © 2025 | Edu Delight Tutors Back to Top ↑


PROMOTED CONTENT

Drink This To Clean Blood Vessels And Make Blood


Pressure 120/80
More...

479 120 160


:

You might also like