E-Note SS Two 2nd Term Data Processing
E-Note SS Two 2nd Term Data Processing
1. Relational Model: (c) Enforcing Integrity constraints (d) Querying relational data
2. File Organization: (a) Types of file organization (b) Comparison of Three file
organization (c) basic operation on file
THEME: INFORMATION TRANSMISSION
3. Internet I: (a) Definition of internet(b) Internet browsers (c)Benefits of Internet
4. First Continuous Assessment (1st CA)
5. Internet II: (d) Internet Security (e) Abuse of the Internet
THEME: TOOLS FOR PROCESSING INFORMATION
6. Midterm Break
7. Presentation Packages: (a) Meaning of Presentation package (b) Uses of
presentation package (c) Getting Started with PowerPoint (Practical Session)
8. Second Continuous Assessment (2nd CA)
9. Web Design Packages: (a) Meaning of web design packages (b) Examples of web
design packages (c) Uses of web design packages (d) Components of web design
packages
10.Revision
11.Examination
12.Examination/Closing
REFERENCES:
1. Data Processing for Senior Secondary School 2, by Adedapo F.O
2. HiiT @ School, Computer Studies for Senior Secondary Education
3. Basic Concepts of Computer Studies for Senior Secondary Schools, by Samuel
Ayokunle and Adeleke Adekola.
WEEK ONE:
TOPIC: RELATIONAL MODEL II
CONTENT:
1. Enforcing integrity constraints
2. Querying relational data
NOT NULL Enforces a column not to accept NULL values, that is the field cannot be
empty.
PRIMARY KEY This constraint uniquely identifies each record in a database table. It always
carries a unique value
FOREIGN KEY This enforces a constraint that prevents actions that would destroy links
between tables, and prevents invalid data being inserted.
CHECK If you define a CHECK constraint on a single column it allows only certain
values for this column. If you define a CHECK constraint on a table it can limit
the values in certain columns based on values in other columns in the row.
DEFAULT allow you to specify a value that the database will use to populate fields that
are left blank in the input source.
Subject Table
Sub_id subject Student_id
1 ICT 2
2 Geography 1
3 Chemistry 2
4 Yoruba 3
CREATE TABLE subject
(
sub_id int NOT NULL, subject varchar(20), Student_ID int,
PRIMARY KEY (sub_id),
FOREIGN KEY (Student_ID),
REFERENCES Student (Student_ID);
There are various SQL query statements which we will look at briefly and what they are meant for.
Fetching Data: SQL SELECT Queries
It is a rare database application that doesn't spend much of its time fetching and displaying data.
Once we have data in the database, we want to "slice and dice" it every which way. That is, we want
to look at the data and analyze it in an endless number of different ways, constantly varying the
filtering, sorting, and calculations that we apply to the raw data. The SQL SELECT statement is what
we use to choose, or select, the data that we want returned from the database to our application. It
is the language we use to formulate our question, or query, that we want answered by the database.
We can start out with very simple queries, but the SELECT statement has many different options and
extensions, which provide the great flexibility that we may ultimately need. Our goal is to help you
understand the structure and most common elements of a SELECT statement, so that later you will
be able to understand the many options and nuances and apply them to your specific needs. We'll
start with the bare minimum and slowly add options for greater functionality.
A SQL SELECT statement can be broken down into numerous elements, each beginning with a
keyword. Although it is not necessary, common convention is to write these keywords in all capital
letters. We will focus on the most fundamental and common elements of a SELECT statement,
namely
SELECT
FROM
WHERE
ORDER BY
The SELECT ... FROM Clause
The most basic SELECT statement has only 2 parts: (1) what columns you want to return and (2) what
table(s) those columns come from.
If we want to retrieve all of the information about all of the students in the student table, we could
use the asterisk (*) as a shortcut for all of the columns, and our query looks like
SELECT * FROM student
If we want only specific columns (as is usually the case), we can/should explicitly specify them in a
comma-separated list, as in; using the student table in the example we had in the previous section,
run the query below:
SELECT student_id, FirstName, LastName, Class FROM student
Result
Student_id FirstName Lastname Class
Explicitly specifying the desired fields also allows us to control the order in which the fields
are returned, so that if we wanted the last name to appear before the first name, we could
write it this way:
SELECT student_id, LastName, FirstName, Class FROM student
We can continue with our previous query, and limit it to only those students in ss1:
SELECT student_id, FirstName, LastName, Class FROM student
WHERE Class= 'ss1'
Only students in ss1 will be echoed. If you want to get other classes you declare it in the query and
the result will be displayed.
ORDER BY Class
The result of the query will arrange the student in order of their class.
EVALUATION:
i. Define Query.
ii. What elements can we break SELECT statement into?
iii. Differentiate between The WHERE Clause and The ORDER BY Clause
CONTENT:
1. Types of file organization
2. Comparison of the Three File Organization
3. Basic Operation on a file
Is also a systematical way of arranging record in a file that is stored on a disk. You can access a file of
record in different ways and tailor it in a variety of ways.
Search with equality selection: Fetch all records that satisfy an equality selection, for example, find
the student record for the student with sid 23. Pages that contain qualifying records must be fetched
from the disk, and qualifying records must be located within retrieved pages.
Search with range selection: Fetch all records that satisfy a range selection. For example, find all
students records with name alphabetically after smith.
Insert: Insert a given record into the file. We must identify the page in the file into which the new
record must be inserted, fetch that page from the disk, modify it to include the new record and then
write back the modified page.
Delete: Delete a record that is specified using its record id. We must identify the page in the file into
which the new record must be inserted, fetch that page from the disk, modify and then write it back.
Locate: Every file has a file pointer, which tells the current position where the data is to be read or
written.
Write: User can select to open a file in write mode, the file enables them to edit its contents. It can
be deletion, insertion or modification.
Read: By default, when file are opened in read mode, the file pointer points to the beginning of the
file.
EVALUATION:
(i) Highlight the various methods of organizing files
(ii) Explain any two
GENERAL EVALUATION
(i) Explain any three ways in which files can be compared.
READING ASSIGNMENT
Study the topic ‘Internet’ using your students’ textbook
WEEKEND ASSIGNMENT
1. Records in a .............................. file are inserted as they arrive
(a) Serial (b) sequential (c) indexed (d) random
2. ................ is the collection of related data items or field.
(a) Data item (b) Field (c) Record (d) File
3. ................... is the smallest unit of information stored in computer file
(a) Data item (b) Field (c) Record (d) File
4. ......................... file is referred to as direct access file
(a) Random (b) Indexed (c) Serial (d) Sequential
5. A file that is sorted on a sequence of fields is called………………
(a) Heap file (b) random file (c) Stack file (d) hash file.
ESSAY QUESTION
1. Clearly distinguish between sequential and random file organization
WEEK THREE:
TOPIC: INTERNET I
CONTENT:
1. Definition of Internet
2. Internet Browsers
3. Benefits of Internet
It is a network of networks that consists of millions of private, public, academic, business and
government networks of local to global scope that are linked by a broad array of electronic and
optical networking technologies. Simply put, the Internet is a collection of computers, all linked
together, to share information worldwide. It is the largest computer network in the world.
Some popular browsers are: Internet Explorer, Opera, Safari, Chrome, Mozilla,
Netscape navigator,Edge.
GENERAL EVALUATION
(i) List Five Examples of an internet browser
(ii) What is E-Banking?
READING ASSIGNMENT
Study the topic ‘Internet Security’ using your students’ textbook
WEEKEND ASSIGNMENT
1. An internet benefit that helps people to get materials and read them in preparation for
examination is called……….. (a) E-Learning (b) reference files (c) E-resources (d) E-coordination
2. A term used to refer to the process of accessing and viewing web pages on the Internet is
called………… (a) Browse (b) Opera (c) Internet (d) scroll
3. All are examples of internet browsers except........... (a) Opera (b) Safari (c) Chrome (d) Emoticon
4. A global system of interconnected computer network that uses the standard Protocol suite is
called (a) Internet (b) Selection (c) user net (d) Sequential
5. A browser can also be called……………. (a)Web browser (b) Organization browser(c) Storage
browser (d) Correction browser
WEEK FOUR: FIRST CONTINUOUS ASSESSMENT (1ST CA)
WEEK FIVE:
TOPIC: THE INTERNET II
CONTENT:
(a) Internet Security
(b) Abuse of the Internet
Computer security focuses on the precautions taken to protect hardware and software components
both in the private and commercial worlds. Internet security, on the other hand, focuses on
preventing cyberattacks happening through the internet by concentrating on browser and network
security. Internet security practices involve the use of encryption, virus protection, and malware
detection, as well as the installation of firewalls and other prevention measures.
Its objective is to establish rules and measures to use against attack over the internet. The internet
represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,
such as phishing. Different methods have been used to protect the transfer of data, including
encryption.
EVALUATION:
1. Mention THREE internet security measures.
2. State EIGHT abuses of the internet.
3. Mention five abuses of the internet.
WEEKEND ASSIGNMENT:
1. A Mail that one has not requested for is called ………… (a) Spam (b) View (c) Delete (d) Creation
2. …………… is not a measure of internet security (a) Encryption (b) protocols (c) Cryptographic
methods(d) Usenet
3. A secret word or string of characters that is used for authentication, to prove identity or gain
access to a resource -------- (a) Computer file (b) Manual file (c) Password (d) Overwriting
4. A branch of computer security specifically related to the internet is called…… (a) Internet breach
(b) Encryption (c) dotted file (d) Anti spam.
5. ------------ is not a way in which the internet can be abused (a) Mail bomb (b) Hacking (c) Spam
mails (d) TCP transponder
WEEK SIX:
TOPIC: PRESENTATION PACKAGE
CONTENT:
(a) Meaning of Presentation Package
(b) Use of Presentation Package
(c) Getting Started with PowerPoint (Practical Session)
PowerPoint Environment
PowerPoint View
PowerPoint provides different types of views to work with, while a presentation is being created.
These views are:
i. Slide view
ii. Outline view
iii. Normal view or Tri-pane view
iv. Slide sorter view
v. Note view
vi. Master view
vii. Slide show
Slide View
This slide view is used to view slides one by one on the screen. In slide view you can insert text,
movie clips, sound, objects like clip art, Auto Shapes and Word Art.
Outline View
In this view you can re-arrange your slides and bullets that you have inserted in your slide. In this
view you can see how your main points flow from slide to slide.
Normal View
This view consists of three pane
- slide pane-to enter and edit text and objects in slides
- Outlines pane-to rearrange the slide
- Notes pane-to insert the information for the speaker or the audience.
Note View
In notes page view, you can type speaker notes to use during your presentation. You can as well
have the hard copy of your notes for reference.
Master View
A company logo or formatting you desired to appear on every slide, notes page or handout can
be done on this view.
Slide show view
This view is used to view the presentation on the screen. A slide show is a full-screen display of
each page in a presentation.
NOTE:
Pls educator, treat all other tools use in PowerPoint.
EVALUATION:
1. What is a Presentation Package?
2. State three (3) Examples of Presentation package
GENERAL EVALUATION:
1. State the general use of a presentation package.
READING ASSIGNMENT:
Students are expected to read ‘Web Design packages’ on the next page of Handbook on
Computer studies for SS2.
WEEKEND ASSIGNMENT:
1. PowerPoint can use existing documents of ………… (a) Word (b) Access (c) pseudo codes (d) Excel
2. ----------- is a software used for making presentations (a) PowerPoint (b) Excel (c) Access(d)
Publisher
3. ---------- Means use of sounds in presentations (a) Animation (b) Backing (c) media (d) storage
4. …………… is not a feature of presentation packages (a) Creation of slides (b) Insertion of video and
audio (c) Animation (d) SMS
5. One of these is not an example of a presentation package? (a) Harvard graphics (b) Ms-
PowerPoint (c) Hacking (d) None
WEEK NINE:
TOPIC: WEB DESIGN PACKAGE
CONTENT:
(a) Meaning of Web Design Package
(b) Examples of Web Design Package
(c) Uses of Web Design Package
(d) Components of Web Design Package
EVALUATION
1. Define a Web Design Package
2. Mention FIVE uses of Web Design package.
GENERAL EVALUATION
1. State the function of a DWT.
READING ASSIGNMENT
Read and summarize the “Components of a web design package”.
WEEKEND ASSIGNMENT
1. ……………… is included which allow users to create a single template that could be used across
multiple pages and even the whole web site (a) DWT(b) Access (c) pseudo codes (d) Excel
2. ------------ gives users the advantage to create snippets (a) Code Snippets (b) Excel (c) Access(d)
Publisher
3. A form of auto completion is a key feature that assists the user while typing in code view.
(a) Animation (b) Backing (c) intellisense (d) snippets
4. …………… give users a new easy way to create web graphics for navigation and links
(a) Interactive buttons (b) Insertion codes (c) Animation (d) SMS
5. One of these is not an example of a Web design package package?
(a) Adobe Dreamweaver (b) Shuttle (c) Amaya (d) NetObjects