Computer Js 1 and 2 third


THIRD TERM E-LEARNING NOTE

JS 1

THIRD TERM E-LEARNING NOTE

 

SUBJECT: COMPUTER STUDIES                                                     CLASS: JSS 1

 

SCHEME OF WORK

 

WEEK           TOPIC

1.                    REVISION/DEFINITION OF COMPUTER PROCESSING

2.                    IMPORTANCE OF COMPUTER AS A DATA PROCESSING TOOL.

3.                    THE DEVICE

4.                    TYPES OF COMPUTER

5.                    USES AND APPLICATION OF COMPUTER

6.                    ADVANTAGES AND DISADVANTAGES OF COMPUTER

7.                    MASTERY OF THE KEYBOARD I

8.                    MASTERY OF THE KEYBOARD II

9.                    SCREEN POINTING DEVICES

10.                 FUNDAMENTAL COMPUTER OPERATION

 

 

WEEK ONE            

TOPIC: DEFINITION OF COMPUTER PROCESSING

COMPUTER PROCESSING

Computer processing is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information. The CPU is a type of electronic “brain” for a computer system, and it executes a series of instructions that are fed to it by software programs installed onto a computer’s hard drive and loaded into random access memory (RAM). Though modern computer systems have become much faster and more complex than their earlier counterparts, they still perform the same basic type of computer processing.

 

There are four distinct states that processing goes through in order to produce meaningful output for any program. These states are commonly referred to as (fetch, decode, execute and write back).

 

A computer has four main components: the central processing unit or CPU, the primary memory, input units and output units. A system bus connects all the four components, passing and relaying information among them. 

 

Ø    Central Processing Unit (CPU)

 Computer scientists typically call the CPU the "brain" of the computer because this is where programs are executed. The CPU is further broken up into three smaller components: the arithmetic unit handles all the simple mathematical computations; the control units interpret the instructions in a computer program; and the instruction decoding unit converts computer programming instructions into machine code.

 

Ø    Memory

Once the CPU converts a specific set of computer program instructions into machine code, it stores that machine code in primary storage or memory. The machine code will be treated as either data or instructions. The CPU fetches data and instructions from memory, uses an instruction to manipulate the data, and then sends the result and the next set of instructions back to memory.

 

Ø    Input Units

Input units are all the devices you use to feed data to the computer, such as a keyboard, a hard drive or a networking card. These devices, in essence, bring data from the "outside world" into your computer, in much the same way that your eyes and ears bring information to your brain. Each input device has its own hardware controller that connects to the CPU and primary memory, and it has a set of instructions that tells the CPU how to use it.

 

Ø    Output Units

Output units are the devices your computer uses to relay information to the user, such as a printer, monitors and speakers. For example, everything you see on your computer monitor starts as machine code in memory. The CPU takes that machine code and converts it into a format required by your monitor's hardware. Your monitor's hardware then converts that information into different light intensities so that you see words or pictures.

 

EVALUATION

1.               Define computer processing.

2.               State four main components of computer.

 

Uses of Computer in communication

1.               Computer gadgets such as mobile phones, palmtops can be used in communicating

2.               The use of Video and Tele-conferencing in having meeting(s) with various members of staff or board of directors in different locations, with the ability to view themselves.

3.               Used in sending and receiving mails through the internet.

4.               Used in multi- media communications.

 

Uses of Computer in Timing and Control

1.               Traffic Control

2.               Weather Control

3.               Machine Control

4.               Airplane Control

 

Uses of computer in information Processing and Management

Ø    Marketing: individuals and companies also use the system to source for e-shopping, 0n-line payment and delivery of ordered goods.

Ø    Generation of payroll: Computers can be used to prepare and process payroll through Microsoft Excel.

Ø    Accounting and Banking: Computers are used to keep proper and effective records of both goods and customer’s money.

 

Uses of computer in the society

Ø    Health Care: Hospitals are comprehensively computerized in order to facilitate patient care at competitive cost.

Ø    Airlines: Airline reservation agent communicates with a centralized computer via a remote terminal to update the database the moment a seat on any flight is filled or becomes available.

Ø    Law: Lawyers use keywords to search through massive full text database containing more cases than in any law office’s library.

 

GENERAL EVALUATION

1.               Define computer processing.

2.               State four main components of computer.

3.               State five uses of computer in the society.

 

READING ASSIGNMENT

Computer studies for junior secondary education JSS 1 By Hiit Plc. pages 65 - 67

 

WEEKEND ASSIGNMENT

1.               The ……..... executes a series of instructions that are fed to it by software programs installed onto a computer’s hard drive and loaded into random access memory (RAM). (a) core        (b) CPU        (c) ROM      (d) control unit

2.               ……….. stores program instruction in the computer system. (a) memory    (b) CPU     (c) ALU (d) control unit.

3.               ……….. are the devices your computer uses to relay information to the user. (a) input unit (b) output unit       (c) memory       (d) primary.

4.               ………. are all the devices you use to feed information to the computer. (a) input unit       (b) output       (c) memory     (d) CPU

5.               ……….. are comprehensively computerized in order to facilitate patient care at competitive cost. (a) Hospitals   (b) airline reservation (c) banking (d) payroll

 

THEORY

1.               Define computer processing.

2.               State four main components of computer.

3.               Mention four areas of the society where computer is used.

4.               List four areas where computer is used in timing and control.

 

 

WEEK TWO

TOPIC: IMPORTANCE OF COMPUTER AS A TOOL FOR PROCESSING DATA

DATA PROCESSING TECHNIQUES

There are different basic techniques of data processing namely:

Batch Processing

Real Time Processing

Time Sharing Processing

Demand Processing

Multi Processing

 

BATCH PROCESSING

It is a technique by which a number of jobs (data) are inputed into the computer system at the same time and the computer is made to execute those jobs, one after the other in sequence, at its own pace.  This type of processing is suitable for accounting and business applications such as payroll accounts, invoicing, purchases, sales, ledger etc.

 

REAL TIME PROCESSING

In Real-Time Processing data are processed immediately, now.  It is processed in rapid manner so that the results of the processing are available in time to influence the current activity or process being monitored or controlled.  It is useful in transaction application where time is a critical factor e.g. airline reservations, banks etc.

 

TIME SHARING

In time-sharing processing, many users can work with the computer through terminals that are connected to remote distance.  Here, the processor time is shared among variable number of users at essentially the same time, that is, it allows simultaneity and concurrency.  Each user is given a fraction of the processor time, at the elapse of which the processor is switched over to another user.

 

DEMAND PROCESSING

This is a type of processing that is done only when it becomes necessary.  The data have been stored in the computer memory, and would then be processed when it becomes necessary.

 

MULTI PROCESSING

In all the modes of computer operation discussed earlier only one processor is in the system.  A multi processing system is one in which there are two or more processors that may be sharing the same main memory.  This makes simultaneous execution of two or more programs possible.

 

ONLINE PROCESSING

This is a kind of processing whereby many terminals are directly connected to the CPU.  It also involves a method of entering transaction and getting the output immediately.  An online system is not always a real time response system, but real time system must have an online capability.

 

EVALUATION

1.               Define data processing.

2.               State four data processing techniques.

 

IMPORTANCE OF THE COMPUTER AS A TOOL FOR DATA PROCESSING

The following are advantages of using computers for data processing:

1.               Speeds: Computer operations (the execution of an instruction such as the addition of two numbers) are done at the speed of light i.e. data is processed at a very fast rate when using the computer.

2.               Accuracy: The computer is very accurate when processing data, it is not prone to errors like human beings.

3.               Reliability: Computers can work for long periods of time performing repetitive tasks without complaining and a user can be sure that a directive given to the computer will be carried out.

4.               Storage: Computer storage is far more efficient such that the quantity of data stored at any point can be accessed anytime it is required.

5.               Memory Capability: Computer systems can store a huge amount of data or information and they have total and instant recall of these data.

6.               Exchange of information: Computer has the ability to exchange information quickly and easily with computers and other devices.

7.               Efficiency and productivity can be raised.

8.               Running cost becomes lower in the long term.

9.               Overall security can be raised due to less human intervention.

 

It may be noted however that, the use of computer for data processing has its own disadvantages: like, it is expensive, it requires trained personnel and it is costly to maintain.

 

GENERAL EVALUATION

1.               Define data processing.

2.               List any four processing techniques.

3.               Give two advantages of using computer to process information.

4.               Give two disadvantages of using computer for data processing.

 

READING ASSIGNMENT

Computer studies Stella Chiemeke   Book 1 page 38.

Modern computer studies by Victoria Dinehin page 20

 

WEEKEND ASSIGNMENT

1.               The …… is a technique by which a number of jobs (data) are input into the computer system at the same time and the computer is made to execute those jobs, one after the other in sequence. (a) batch processing (b) on-line processing (c) time sharing (d) demand processing

2.               Computer operations are done at a speed of …... (a) moon (b) electronic (c) Light         (d) sun

3.               …….. is a kind of processing whereby many terminals are directly connected to the CPU.   (a) online processing (b) demand processing (c) time sharing (d) batch processing

4.               In time-sharing processing, many users can work with the computer through terminals that are connected to remote distance. 

(a) batch   (b) time sharing   (c) demand  (d)  online

5.               A………….. system is one in which there are two or more processors that may be sharing the same main memory. (a) Multi processing (b) batch processing

(c) online processing (d) real time processing

 

THEORY

1.         Write short note on the following:

            (a)       Batch Processing

            (b)       Real-Time Processing

            (c)       Time Sharing

            (d)       Online Processing

2.         State six importance of using computer as a data processing tool.

 

 

WEEK THREE

TOPIC: THE DEVICES

DEFINITION

CLASS OF DEVICES

 

DEFINITION OF A DEVICE

Devices are instruments, equipments or machines made to perform specific functions.

 

CLASS OF DEVICES

Devices can be classified into four types:

·                 Early counting devices

·                 Mechanical devices

·                 Electrical device

·                 Electronic device

·                 Analogue device

 

EVALUATION

1.     What is a device?

2.     List the five classes of device.

 

1.     Early counting devices: Examples of this include stones,pebbles,beads,fingers and toes,sticks,grains,marks on the wall etc.

2.     Mechanical devices: mechanism consisting of a device that works on mechanical principles. Examples of this include ship, cart, sewing machine, motorcycle, car, typewriter, wheel barrow, Abacus, Slide rule, Napier bone, Pascaline, Jacquard’s loom, Babbage’s analytic engine

3.     Electrical devices:  take the energy of electric current and transform it in simple ways into some other form of energy  Examples include electric iron, electric kettle, blender, mixer, electric clipper, fridge, fan, washing machine, grinding machine etc

4.     Electronic devices: are components for controlling the flow of electrical currents for the purpose of information processing and system control. Examples include photocopier, scoreboard, calculator, radio, camera, television, telephone and computer.

5.     Anologue: They are used to measure things that change from time to time. Examples include: barometer, thermometer, weighing scale, rainguage etc.

 

GENERAL EVALUATION

1.               What is a device?

2.               List the five classes of device.

3.               State the examples of devices. 

 

READING ASSIGNMENT

Computer studies Stella Chiemeke   Book 1 page 41.

Modern computer studies by Victoria Dinehin page 21

 

WEEKEND ASSIGNMENT

1.               ____ is an equipment used to perform specific function. (a) Devices  (b) Computer (c) Analog (d) mechanical

2.               Devices can be classified into ____ (a) 3 (b) 4 (c) 5 (d) 2

3.               Which of these is not early counting devices? (a ) fingers  (b) sticks   (c ) Calculator (d) pebbles

4.               Abacus is an example of ____ devices (a) Mechanical (b) Electrical (c) Computer  (d) electrical

5.               ____ is an example of electronic device (a ) Abacus (b) Computer  (c ) Fan (d) ship

 

THEORY

1.     What is a device?

2.     List the five types of devices with examples.

 

 

WEEK FOUR

TOPIC: TYPES OF COMPUTER.

CONTENTS

There are three types of Computers namely:

Digital computer

Analogue Computer

Hybrid computer

 

Digital Computer

Digital computer system is a system or device using discrete signals or values to represent data numerically. They are computers that are used for counting and to work on numbers.

It works on data of non-continuous or discontinuous nature. Most digital representation in computing is based on the binary system. For example, the channel select on the television set is a digital device because it restricts you to a discrete set of channels. Another example is the digital wrist watch which shows you the exact time in digits and digital computers, calculator, microcomputer, digital ammeter.

 

Analogue Computer

These are computers that work on non-discrete or continuous data. In contrast to digital computers, they have continuous value. They are used to measure values that changes from time to time. Examples of such measurements are temperature, speed, weight etc.  . They measure physical quantities and convert them to numbers.  Examples of  analogue devices are thermometer, speedometer, fuel gauge, electric meters ,petrol dispenser at petrol station and analogue ammeter.

 

They are mostly used in industrial operations.

 

Hybrid Computers

The high speed of analogue machine is combined with the flexibility of a digital machine. A hybrid computer is made up of digital and an analogue connect together in a system.

Hybrid computers are mostly used in scientific  research and technical application because they count and measure. They have both ability to handle discrete and non-discrete data since the properties of analogue and digital are combined in hybrid computers.

 

EVALUATION

1.     Mention the three types of Computers.

2.     Write short notes on the three types of Computers.

 

READING ASSIGNMENT

Modern computer studies by Victoria Dinehin pg 84-85

 

WEEKEND ASSIGNMENT

1.     How many types of computer do we have? (a) 1   (b) 2    (c) 3     (d) 4

2.     Analogue computers work on ____ (a) non-discrete data (b) discrete data (c) data (d) digital

3.     ____ computer measures physical quantities. (a) Digital (b) Hybrid (c) Analogue (d) none

4.               ____ computer is used for counting? (a) Digital (b) Hybrid (c) Analogue

(d) continous

5.               Which of these computers has the ability to handle discrete and non discrete?

(a) Digital (b) Hybrid (c ) Analogue (d) continuous

 

THEORY

1.     List the three types of computers.

2.     Write short notes on the three types of computers.

3.     List any two examples each of digital devices and analogue devices.

 

 

WEEK FIVE

TOPIC: USES AND APPLICATION OF COMPUTER

CONTENT

USES OF COMPUTER

1.               Computer can be used in computer schools, hospitals, government offices.

2.               Computers are used for organizing data management and information.

3.               It enhances the learning process with interactivity e.g students’ compact disk.

4.               It aids communication system through e-mail, teleconferencing, telephone E-presence.

5.               It is also used for word processing i.e. used to write letters, memos and documents.

6.               Computers are used for graphical presentation such as production of all sorts of cards, letterheads calendars etc.

7.               It is used for fun, excitement and relaxation through computer games.

8.               It helps to plan schedule and control people resources and cost of project.

 

APPLICATION OF COMPUTERS

1.     Computer in education: they are used as teaching aids in CAL (Computer Aided Learning) or CAI(Computer Aided Instruction).

2.     Personnel administration: are required for the keeping of comprehensive records on employees.

3.     Computer in business: is used for planning and forecasting using simulated scenarioss. For experience and solution.

4.     Medicine: used to check health parameters of patients.

5.     Banking: helps to solve large amount of bank dealings and operations.

6.     Engineering: complex calculations and drawings are easily tackled.

7.     Recreational activities: used for playing games for relaxation, fun and excitement.

8.     Computer in art and music: the use of AutoCAD(computer aided drawings; amateur and professional musicians can compose or play and refine existing musical composition on computer.

 

EVALUATION

1.               Mention five uses of computer in the society.

2.               State five application areas of computers.

ADVANTAGES OF COMPUTER

1.     Computers are fast.

2.     They have large storage facilities.

3.     Computers are very accurate.

4.     It performs more operations that can be effectively performed manually.

5.     Computer accommodates growth i.e enabling the organisation to move forward and compete effectively with other firms.

6.     Provides immediate access to data  i.e providing customers and clients with immediate responses to inquire about services rendered.

7.     Assist with decision making i.e. delivering information n timely manner.

 

DISADVANTAGES OF COMPUTER

1.     Computer systems are very expensive and not everybody could afford to buy one.

2.     Computer is an electronic device that cannot think on its own i.e. garbage in garbage out (GIGO).

3.     It makes some professional jobless.

4.     Misuse of computer information can be extended to include computer crime

5.     The uses of computer are limited to availability of electric power

6.     Computers can easily be attacked by virus.

7.     The uses of computer are limited to professional or educated users.

 

GENERAL EVALUATION

1.               State five uses of computer.

2.               State five areas of application of Computer.

3.               State three for each the advantages and disadvantages of computer.

 

READING ASSIGNMENT

Modern Computer Studies by Victoria Dinehin pg 30-32

 

WEEKEND ASSIGNMENT

1.               GIGO means …….. a) Garbage in Garbage out. b) Garbage indoor Garbage outdoor (c) Gate In Gate out  d)   all of the above

2.               ………. is used for computer teaching aids. a)TAN b) CAN c)  CAD (d) PAN

3.               Computer is used in ……. to check health parameters of patients. (a) medicine (b) school c) industry (d) factory

4.               Computers can be used for electronic advertising in form of electronic bill board a)true b) false c) none of the above (d) all of the above

5.               ……….is used for fun, excitement and relaxation.  (a) computer game        (b) word        (c) graphic (d) excel

 

THEORY

1.               State five uses of computer.

2.               State five areas of application of Computer.

3.               State three for each the advantages and disadvantages of computer.


WEEK SIX

TOPIC: ADVANTAGES AND DISADVANTAGES OF COMPUTER

CONTENT

ADVANTAGES OF COMPUTERS

1.               Computers are widely used for data processing because they possess certain advantages over manual labour by humans.

2.               Computer can be used to process data at a faster speed.

3.               Increased access to the information stored in the resource centre.

4.               Process data at an accurate rate.

5.               It can be used to process a very large volume of transaction no matter how complex it may appear.

6.               Reliable in its work.

7.               It has a large storage capacity

8.               It provides a better job quality.

9.               Increased efficiencyinformation stored on a computer database can be used for different purposes.

 

DISADVANTAGES

Unemployment

Different tasks are performed automatically by using computers. It reduces the need of people and increases unemployment in society.

 

Wastage of Time and Energy

Many people use computers without positive purpose. They play games and chat for a long period of time. It causes wastage of time and energy. Young generation is now spending more time on the social media websites like Facebook, Twitter etc or texting their friends all night through smartphones which is bad for both studies and their health and it also has adverse effects on the social life.

 

EVALUATION

1.               State four advantages of computer

2.               State two disadvantages of computer.

 

Data Security

The data stored on a computer can be accessed by unauthorized persons through networks. It has created serious problems for the data security.

 

Computer Crimes

People use the computer for negative activities. They hack the credit card numbers of the people and misuse them or they can steal important data from big organizations.

 

Privacy Violation

The computers are used to store personal data of the people. The privacy of a person can be violated if the personal and confidential records are not protected properly.

 

Health Risks

The improper and prolonged use of computer can results in injuries or disorders of hands, wrists, elbows, eyes, necks and backache . The users can avoid health risks by using the computer in proper position. They must also take regular breaks while using the computer for longer period of time. It is recommended to take a couple of minutes break after 30 minutes of computer usage.

 

GENERAL EVALUATION

1.               Define data security

2.               State the problems associated to data security.

 

WEEKEND ASSIGNMENT

1.               The following are the advantages of computer a)it has high speed b) better job qualities c) reliability d)all of the above

2.               Prone to fraud is one of the disadvantages of using computer a) true b) false c) none of the above

3.               The use of computer creates unemployment a) true b) false c) none of the above

4.               Computers can be used for electronic advertising in form of electronic bill board

a) true b) false c)none of the above

5.               One of the following is not a disadvantage of computer. (a) health risks

(b) privacy violation (c) unemployment  (d) reliability

 

THEORY

1.               Mention seven advantages of computer.

2.               State five disadvantages of using computer.

 

 

WEEK SEVEN

TOPIC: MASTERY OF THE KEYBOARD I

CONTENT

DEFINITION

KEYBOARD

Keyboard is an electronic device with several groups of keys electronically linked to the processor when attached to a computer system. It is the common input device used for entering data into the computer.

There are two main types keyboards used with micro – computer; they are:

1.               Standard keyboard

2.               Enhanced keyboard

 

Features of Standard Keyboard

·                 It has ten functions keys. (F1 - F10)

·                 It has four arrow keys

·                 It ha 84 – 89 keys

 

Features of Enhanced Keyboard

·                 It has 12 function keys ( F1 – F12)

·                 It has 8 arrow keys

·                 It has 101 – 105 keys

 

Types of Enhances Keyboard

1.               Multimedia keyboard

2.               Programming keyboard

3.               Cordless keyboard

 

 

Sections of the Keyboard

Keyboard is basically divided into five sections;

1.               Alphanumeric keys: These are made up of alphabets and numbers. 

2.               Function keys (F1 – F12)

3.               Control keys: DEL, CTRL, esc and Alt

4.               Cursor: Control the screen movement keys e. g. arrow, home, end, page up etc.

5.               Numeric keypad: It is arranged in a calculator type structure.

 

EVALUATION

1.               Define the keyboard.

2.               State the two types of keyboard.

3.               Mention five sections of the keyboard.

 

READING ASSIGNMENT

Modern computer studies by Victoria Dinehin page 160

 

WEEKEND ASSIGNMENT

1.               The types of enhanced keyboard include the following excpt. (a) multimedia

(b) programming (c) cordless (d) standard

2.               There are …….. types of keyboard. (a) a  (b) 3   (c) 2  (d) 5

3.               The ……..   has eight arrow keys.  (a) standard  (b) enhance  (c) multiple

(d)  intermediate

4.               The…….. has ten functions keys. (a) enhance  (b) standard  (c) none of the above  (d) none of the above.

5.               ……….. key controls the screen movement keys. (a) cursor (b) numeric

(c) function (d) alphabet.

           

THEORY

1.               Define the keyboard.

2.               State the two types of keyboard.

3.               Mention five sections of the keyboard.

 

READING ASSIGNMENT

Modern computer studies by Victoria Dinehin page 160

 

 

WEEK EIGHT

TOPIC: MASTERY OF THE KEYBOARD II

Correct Sitting Position

v    Make sure you have correct sitting posture to avoid back ache,eye strain and aching hands

v    Adjustable seat back.

v    Room to move your legs,

v    Screen at comfortable height.

v    Use anti-glare protector.

 

Using the Keyboard to Type Names, Letter

Use of software tutor e.g Mavis beacon typing tutor

Attempt using your ten fingers to type

Have a soft touch on the keyboard

EVALUATION

State the correct sitting positions for mastering keyboard typing acts.

 

READING ASSIGNMENT

Modern Computer Studies by Victoria Dinehin page 161

 

WEEKEND ASSIGNMENT

1.               The types of enhanced keyboard include the following excpt. (a) multimedia

(b) programming (c) cordless (d) standard

2.               There are …….. types of keyboard. (a) a  (b) 3   (c) 2  (d) 5

3.               The ……..   has eight arrow keys.  (a) standard  (b) enhance  (c) multiple

(d)  intermediate

4.               The…….. has ten functions keys. (a) enhance  (b) standard  (c) none of the above  (d) none of the above.

5.               ……….. key controls the screen movement keys. (a) cursor  (b) numeric

(c) function (d) alphabet

 

THEORY

1.               State correct sitting positions for mastering keyboard typing acts.

2.               State the uses of keyboard.

 

 

WEEK NINE

TOPIC: SCREEN POINTING DEVICES

A device with which you can control the movement of the pointer to select items on a display screen, is a hardware input device that allows the user to move the mouse cursor in a computer program or GUI operating system.

 

Types of Screen Pointing Devices

1.              Mouse

2.              Track Ball

3.              Touch Ball

4.              Joystick

5.              Light pen

 

Mouse

A mouse is a pointing device used to control the movement of a pointer cursor in a graphical environment. It is an alternative to the keyboard.

The different versions of mouse are as follows:

1.               PS/2

2.               Serial

3.               Universal serial bus (USB)

4.               Cordless

 

Parts of a mouse

A mouse is made up of the following parts:

1.               Left button: This is used for clicking or double clicking an object.

2.               Right button: It brings a task menu which contains some commands.

3.               Mouse ball: This is a small round ball under the mouse which rolls or a mouse pad or smooth surface as the mouse is moved on the table.

4.               Mouse pointer: This is a small arrow- shaped object that moves around on a computer screen and which is used to point at objects in a graphical operating environment.

5.               Mouse cord: It is a tiny cord fixed onto the mouse for transferring signals to the processor               

 

EVALUATION

1.               List five examples of screen pointing devices.

2.               Mention four different versions of mouse

                                              

MOUSE TECHNIQUES

Pointing: Move the mouse to move the on-screen pointer.

Clicking: Press and release the left mouse button once.

Double-Clicking: Press and release the left mouse button twice.

Dragging: Hold down the left mouse button as you move the pointer.

Right-Clicking: Press and release the right mouse button.

Select and deselecting objects.

 

GENERAL EVALUATION

1.               List five examples of screen pointing devices.

2.               Mention four different versions of mouse

3.               State five parts of a mouse

4.               State five mouse action techniques.

5.               Differentiate between right clicking and left clicking.

 

READING ASSIGNMENT

Modern Computer Studies by Victoria Dinehin pages 162- 163

 

WEEKEND ASSIGNMENT

1.               A ………….. is a  pointing device across a desk surface in order to point and select objects on the screen. (a) keyboard  (b) scanner  (c) mouse  (d) light pen

2.               The …… mouse button is the  most frequently used. (a) Left     (b) Right 

(c) Center   (d) Middle

3.               The following are examples of screen pointing devices except ………. (a) mouse  (b) joystick   (c) light pen  (d) keyboard

4.                  ………. is a tiny cord fixed onto the mouse for transferring signals to the processor. (a) mouse pointer     (b) mouse cord   (c) keyboard  (d)  track ball

5.                ……… is used for clicking or double clicking an object. (a) left button  (b) right button  (c) mouse cord  (d) track ball

 

THEORY

1.               List five examples of screen pointing devices.

2.               Mention four different versions of mouse

3.               Briefly explain how a computer mouse works.

 

WEEK TEN

TOPIC: FUNDAMENTAL COMPUTER OPERATION

CONTENT

Booting

Booting is the process of starting the computer or preparing the computer for use.

Starting up a Micro Computer System

When the power button is pressed to boot up, the PC goes through a process called power- on – self test (POST). This POST enables the computer to read several files to remind itself what it should be doing and to perform a complex series of tests to make sure all its hardware components are working properly.

When the computer is booted up, an electrical current travels to the microprocessor and resets the chip to clear its memory. During reset, the microprocessor sends a command to the computer’s read only memory (ROM) chips to run the computer’s basic input/output system (BIOS) boot program. Thereafter, the boot program connects the hard drive, loading windows XP/VISTA/7 core system files through the microprocessor and loading the device driver software needed to allow communication between the operating system and the PC’s hardware.

After communicating with the video card to create the desktop environment, windows operating system then opens the Startup folder which is immediately accessed from the hard drive and loaded through the microprocessor into RAM, after which the computer is ready for use.

 

There are two types of booting:

1.               Cold booting

2.               Warm booting

 

Cold booting: The process of switching the computer by pressing the power switch on the system unit.

Warm booting: The process of restarting the computer by pressing the reset button on the system unit or by using the ctrl + Alt + Del key.

 

EVALUATION

1.               Define booting.

2.               List and explain the two types of booting.

 

READING ASSIGNMENT

Modern Computer Studies by Victoria Dinehin pages 63- 65

 

WEEKEND ASSIGNMENT

1.               The process of starting up computer is referred to as ………. (a) booming

(b) switching (c) booting  (d) starter

2.               The two types of booting are ….. and …….. (a) cold and warm booting  (b) cold and hot booting (c) warm and hot booting  (d) none of the above

3.               The process of switching the computer by pressing the power switch on the system unit is called …… booting.  (a) cold booting (b) hot booting (c) weather  (d) cold

4.               The process of restarting the computer by pressing the reset button on the system unit or by using the ctrl + Alt + Del key is called……… (a) cold booting (b) hot booting  (c) warm booting (d) CPU

5.               BIOS means ……………. (a) basic input/output system  (b) base input/output system  (c) boot inside/outside storage  (d) basic inside/outside system

 

THEORY

1.               Define booting

2.               List and explain the two types of booting

3.               State the acronym for the following: (i) POST   (ii) BIOS

 


SUBJECT: COMPUTER STUDIES                                                                                     CLASS: JSS2

 

SCHEME OF WORK

 

WEEK             TOPIC

1.                          Internet I

2.                          Internet Browser

3.                          Benefits of using the Internet

4.                          Abuse of the Internet

5.                          Computer Network

6.                          Data Communication

7.                          Computer Ethics

8.                          Ways of misusing the Computer System

9.                          Safety Measures I

10.                       Safety Measures II

 

 

WEEK ONE

TOPIC - INTERNET I

Reference Book

A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

CONTENT

The word “INTERNET” stands for International Network simply put as NET. It comprises of all computers around the world, connected together to share resources and information irrespective of distance and/or geographical location. The Internet is a worldwide communication medium or pool from where people all over the world could exchange retrieve, disseminate and store information thus, turning the world into a global village. It is the use of internet that actually turns the world into a global village where users like government, military, educational and commercial institutions around the world becomes one. There is no person, company, government or country that can claim single ownership of the internet. The computers within the internet are connected via communication equipments including telephone lines i.e. wired or wireless, satellites etc.

 

WHAT IS INTERNET?

The internet that is International Network is an electronic means of communication via a computer network, whereby people all over the world can have access to information at any time in a matter of seconds. Information can be given to people all over the world to see and retrieve at the same time using computer and telephone. It is the fastest and the most reliable means of data and information transfer.

 

Internet is a worldwide communication medium where people all over the world can exchange, retrieve, disseminate and store information. No one person or organization owns the internet. It belongs collectively to the telecommunication companies.

 

EVALUATION

What is Internet?

 

E-MAIL

E-mail simply means electronic mail. It is the most widely used resource on the net. It has a common resource provided by the net from sending and receiving electronic. E-mail has become the live wire for many business and personal communication. It is easier, faster and better. Email are sent and received to or from any part of the world in a second. To send e-mail involves composing the message, connecting and sending the message. Generally, the message is created or composed on the computer and send through the same medium to the destination. To facilitates effective use of e-mail facilities, user also needs to have his or her own e-mail address (i.e. adeoleganoloaniyi@yahoo.com), because in any form of letter writing there is always the addresser’s address and the addressee’s address.

 

EVALUATION

1.     What is E-mail?

2.     Give an example of e-mail address

 

WORLD WIDE WEB (WWW)

The World Wide Web (www) is a package designed to present detailed information about an organization, product services. The World Wide Web also refers to as the web is the global collection of multimedia document and files, which are stored on computer connected to the internet. There are specific sites called website that have unique feature or information. A website is a collection of web pages maintained by the owner of the site. It is like having files containing information about your activities all in one collection. Each of the site has unique addressand  is called UNIFORM RESOURCE LOCATORS (URL) by which the site can be reached or located for whatever information. A typical URL anatomy made of three parts.

 

Part                                                   Meaning

Http://                                                protocol

www.lycos.com/                                the name of the computer where the information is located

Index                                                  the path and filename of the file retrieve

 

GENERAL EVALUATION

1.     What is the World Wide Web?

2.     What is URL?

3.     The URL can be divided into how many parts?

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     Another name for INTERNET is …. (a) NET(b) Network(c) global village

2.     The INTERNET has turned the whole world into a … (a) Computer (b) Network

(c) global village

3.     ... is the fastest and the most reliable means of data and information transfer          

(a)   www (b) e-mail (c) Internet

4.     E-mail simply means …. (a) Internet      (b) electronic mail (c) International network

5.     A website is a collection of ….. (a) web pages(b) e-mail addresses (c) network

 

SECTION B

1.What is the World Wide Web?

2.Give an example of e-mail address

 

 

WEEK TWO

TOPIC - INTERNET BROWSER

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

The Internet Browser or Web Browser is a program that enables you to view and explore information on the web. Examples of Internet Browsers are Microsoft Internet Explorer, Netscape, Mozilla Firefox etc. The internet Explorer is the device used to connect users to the internet on a Microsoft computer. To download the internet explorer on your computer, click on the “blue” e on the computer desktop. After you have done this, the internet page will appear. The particular web page that loads on your screen is your screen is your default homepage. You can change it if you wish. If no page is loaded, it means you have not connected to the internet or there is a problem with your connection.

To download a website off your choice after you have downloaded the internet page, type the address of the website you want to browse in the address bar e.g. www.yahoo.com and press enter key. The internet explorer would quickly search for the website and bring it to your view for browsing. What the internet will bring to you is the web page on that website. All the information you need to know about the organization will be displayed.

 

USES OF THE INTERNET

The internet can be used for the following purposes

1.     Getting information e.g. news, results of exams i.e. NECO, WAEC, JAMB etc

2.     Displaying information.

3.     For entertainment e.g. playing games, watching movie etc

4.     Communication e.g. sending e-mail, chatting etc

5.     Application for jobs

6.     Buying and selling e.g. e-commerce

7.     For banking e.g. money transfer

 

EVALUATION

1.     What is Internet browser?

2.   Mention FIVE uses of the internet.

 

E-MAIL

E-mail is an acronym of Electronic Mail. It is the most widely used resource on the net. It has a common resource provided by the net for sending and receiving electronic mail. E-mail has become the livewire for many business and personal communication.To send E-mail involves: Composing the message, connecting and sending the message. Generally, the message is created or composed on the computer and send through the same medium the destination. Simple software may be used for sending, receiving and connecting to the host computer.

 

HOW TO CREATE AN E-MAIL ADDRESS

Tips: To create a free e-mail address, first determine the web mail service you want to use. Yahoo is your best bet.

STEP 1: Move your mouse to Address field and click the left button, then type http://www.yahoo.com and press enter key on the keyboard.

STEP 2: Move your mouse to Check mail and click the left mouse button.

STEP 3: Move your mouse to Sign up Now and click the left mouse button.

STEP 4: In yahoo mail – free edition, move your mouse to sign me up and click the left mouse button. Yahoo displays the registration form.

STEP 5: Follow the instructions and your particulars in the fields (spaces) provided. Scroll to view the other pages of the registration form.

STEP 6: At the end of the form, move your mouse to submit and click the left mouse button.

Note: if you had entered a Username already taken by someone else, the web server will display alternative user names for you to choose from, make selection from the suggestions or choose another user name yourself.

STEP 7: Make other needed changes, then move your mouse to Submit and click the left mouse button. If the information entered is correct, the web server will display a “Welcome to Yahoo…” This message indicates that you have successfully registered your e-mail address.

STEP 8: Move your mouse to continue to yahoo mail and click the left mouse button. To read the first mail sent to you by Yahoo confirmation, move your mouse to Check Mail and click the left mouse button.

 

GENERAL EVALUATION

How can you create your own e-mail address?

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     Another name for Internet browser is … (a) Web browser (b) Net (c) E-mail

2.     One of the uses of the internet is … (a) Communication            (b) drawing (c) eating

3.     E-mail means … (a) Electronic mail (b) Electric mail (c) Electronic messenger

4.     Can Money transfer be done on the internet? (a) Yes(b) No(c) I don’t know

5.     The best website to create e-mail address is … (a) Yahoo(b) myspace(c) facebook

 

SECTION B

1.What is Internet browser?

2.Mention FIVE uses of the internet.

 

 

WEEK THREE

TOPIC - BENEFIT OF USING THE INTERNET

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

The users of internet cut across various professional and non professionals alike. Users of the internet have access to the following facilities.

1.     Access to data bank and research information.

2.     E-COMMERCE: this is the act of buying and selling on the internet: doing business on the internet.

3.     QUICK AND EFFECTIVE EXCHANGE OF INFORMATION: The internet provides search tools called Search Engines for users to get information quickly and easily. Easy maintenance and updates making information instant.

4.     ACCESS TO INTERNET LIBRARY SERVICES: Online publishing of information on different topics. Magazines and newspaper publishers around the world are now making their publication available on the internet.

5.     PRODUCT OR SERVICE ADVERTISMENT: Businesses and clients now transact businesses or the internet. Many shops are now making their shops to be online.

6.     RECREATION AND ENTERTAINMENT: Internet gives you access to the latest movie, music or theatre information. You can also have a live chat with your friends and loved ones far away.

7.     EDUCATIONAL TOOL: There is a lot of information on the internet e.g. e-learning and e-education. Participation in online group discussion and chatting are made possible by the power of the internet.

8.     JOB OPPORTUNITY: You can get job opportunity on the internet.

9.     Internet can be accessed very easily at anytime of any day from anywhere in the world.

10.  It allows users to have access to a vast range of information from many different sources

11.  Information provided on the internet is cheaper and frequent. It is cost savings.

12.  It provides up to date information on all spheres of human endeavours.

 

GENERAL EVALUATION

Write down TEN benefits of using the internet

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     The act of buying and selling on the internet is called ………………..

(a)   E-commerce      (b) E-mail      (c) E-shop

2.     The act of schooling on the internet is called................

(a)   E-learning       (b) E-commerce                  (c) E-banking

3.     Internet gives you access to data bank and research information.

(a)   True                (b) False                (c) I don’t know

4.     Is it possible to do Banking on the internet? (a) Yes (b) No (c) I don’t know

5.     You cannot a get job opportunity on the internet (a) True (b) False (c) I don’t know

 

SECTION B

(1) Write down TEN benefits of using the internet

(2) What is E-commerce

 

 

WEEK FOUR

TOPIC - DISADVANTAGES / ABUSE OF THE INTERNET

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

1.     FRAUD: Fraud can be described the theft of assets without the consent of the lawful owners or misrepresentation of truth in order to deceive. The internet is now a source of making money by fraudsters.

2.     HACKING: This term used to describe the theft and vandalization of both hardware and

software resources as well as official documents

3.     THEFT OF PERSONAL INFORMATION: If you use the internet you may be facing grave danger as your personal information such as name, address, credit card number etc can be accessed by other culprits to dupe you or other people.

4.     SPAMMING: This refers to sending unwanted emails in bulk, which provide no purpose and needlessly obstruct the entire system. Such illegal activities can be frustrating and so instead of just ignoring them, you should make efforts to try and stop these activities so that using the internet can become much safer.

5.     VIRUS: Virus is nothing but a program which disrupts the normal functioning of your computer system. Computer attached to the internet are more prone to virus attacks and they end up into crashing the entire hard disk causing you a serious problem.

6.     PORNOGRAPHY:  This is perhaps the biggest threat related to children’s or young people’s mental life. This is a very serious issue concerning the internet. There are thousands of pornographic sites on the internet that can be easily found and can be detrimental to children using the internet,

7.     CYBER WAR: This is the use of electronic network and information as weapon of attack. E.g. when internet users use the internet to send provocative mails or chat to cause chaos and distract them.

8.     TIME MISMANAGEMENT: Internet makes people to spend less time with their family because of search for information and work overload.

 

GENERAL EVALUATION

Write and explain FIVE ways to abuse the internet

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     …………… is a program which disrupts the normal functioning of your computer system

(a)   Virus         (b) Software         (c) Operating System

2.     …………… is the use of electronic network and information as weapon of attack

(a)   Cyber war (b) Pornography      (c) Virus

3.     The biggest threat related to children’s or young people’s mental life is …………….

(a)   Pornography      (b) Virus      (c) Cyber war

4.     --- is the act of sending unwanted emails in bulk (a) Spamming (b) Pornography (c) Virus

5.     Internet makes people to spend less time with their family (a) True (b) False (c) I don’t know

 

SECTION B

1.Write and explain FIVE ways to abuse the internet

2.  What is cyber bully?

 

 

WEEK FIVE

TOPIC - COMPUTER NETWORK

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

A Computer Network is a group of computer connected to each other to a central server so that they can share resources such as document and printer. A computer network is defined as the interconnections of two or more computer systems with data communication devices. It consists of communications software (i.e. Network operating system) computer systems (modes), Network cards (connector) and network cable medium.

Networking reduces duplication of computer resources. This enables the scarce resources to be shared among the computer system on the network. Therefore, it allows the sharing of files, application software products, printer, disk space, modern, faxes, CD ROM drives and E-mail facilities. The control system unit is called the HOST while the connected system unit is called GUEST OR SERVER. The terminal cannot work unless the server is on.

 

EVALUATION

What is a Computer Network?

 

TYPES OF NETWORK

The prominent networking services are of three types:

1.     Local Area Network (LAN)

2.     Wide Area Network (WAN)

3.     Metropolitan Network (MAN)

4.     International Network (INTERNET)

1.     LOCAL AREA NETWORK (LAN): This is the interconnection of two or more computers within a small geographical area such as an office or a building.

2.     METROPOLITAN NETWORK (MAN): This is the type of network or computer connections with a state or city. The HOST system and server is not far from each other.

3.     WIDE AREA NETWORK (WAN): This network system connects computers together across a large geographical area such as a country or inter-states.

4.     INTERNATIONAL NETWORK (INTERNET): The Internet can be defined as a global, interconnected network, hence the name Internet (International Network) or simply the Net. It is a network that links the whole world thus turning the world into a global village.

 

METHODS OF NETWORKING

There are two main methods of networking they are:

1.     Wired or Cable Network

2.     Wireless Network

 

WIRED OR CABLE NETWORK

This is the type of network using cable wires to connect computers together. This is applicable in Local Area Network (LAN) and Metropolitan Area Network (MAN). Its components are: NIC Networking Operating System, Network (Cable and BNC connectors)

 

WIRELESS NETWORK

This is the type of network which does not employ the use of wire. It makes use of radio waves, microwaves etc to transmit information. Its components are

-          Network Interface Components (NIC)

-          Network Operating System

-          Network Antenna (Aerial)

-          Special Modem (Radio modem)

 

GENERAL EVALUATION

1.     Explain the two methods of networking.

2.     How many types of network exist?

3.     List the types of network.

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     …………… is the interconnections of two or more computer systems

(a)   Computer Network                  (b) Internet           (c) Intranet

2.     … is the type of network or computer connections with a state or city

(a)   WAN                          (b) LAN                (c) MAN

3.     INTERNET means … (a) International Network (b) International Nation (c) Icon Network

4.     … is the type of network using cable wires to connect computers together

(a)   Wired Network           (b) Wireless Network    (c) International Network

5.     … is the type of network which does not employ the use of wire

(a)   Wired Network           (b) Wireless Network    (c) International Network

 

SECTION B

1.How many types of network exist?

2. List the types of network.

 

 

WEEK SIX

TOPIC - DATA COMMUNICATION

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

Data communication refers to the communication between machines, computers and computer peripheral equipment in order to increase the speed and ease the movement of data information from one place to another. Data Communication involves five parts such as:

SOURCE – TRANSMISSION – CHANNEL – RECIEVER – DESTINATION

The origin of data is known as the source while destination is where data is sent to. The medium through which data is communicated (conveyed) to the destination from the source is transmission channel or simply put as channel. Channel does not necessarily mean a physical device. It is the path over which data and information travels. However, data transmission or communication problem is the noise which serves as electronic interface.

 

EVALUATION

What is Data Communication?

 

MODES OF DATA TRANSMISSION

The various transmission modes are

1.     Synchronous transmission

2.     Asynchronous transmission

3.     Simplex transmission

4.     Duplex transmission

5.     Half Duplex transmission

 

ASYNCHRONOUS TRANSMISSION: This is referred to as start – stop transmission. It transmits on character at a time over a line. It is used for low speed transmission.

 

SYNCHRONOUS TRANSMISSION: It transmits groups of characters simultaneously with

the beginning and ending of a block of characters determined by the timing circuitry of sending and receiving devices.

 

SIMPLEX TRANSMISSION: The transmission of data is in one direction only e.g. broadcasting news on radio or television. These systems are employed in the broadcasting network when the receiver does not necessarily need to send the feedback back to the transmitter.

 

DUPLEX TRANSMISSION: This transmission method allows transmission of data and information in both directions but not simultaneously. This form of transmission of data is in both direction but not at the same time.

 

DATA TRANSMISSION EQUIPMENT

There are various equipments used in data transmission. These are the equipments used to facilitate the transfer of data (signals) from or location to another. Example includes:

1.     MODEM: The term modem is a condensation of the two terms modulator and demodulator. A modem is a hardware interface connected to each end of a communication channel.

2.     MULTIPLEXORS: This is a device which enables a number of signals to be accommodated on a single communication line or channel for the purpose of moving data or information between the source and the destination.

3.     DEMULTIPLEXERS: These equipments perform just exactly opposite action of a multiplexor by demultiplexing the received signals coming from multiplexor channels.

4.     ROUTER: A router is a system that routes or passes messages from one LAN to another.

5.     REPEATER: These are specified main trunking transmission length.

 

GENERAL EVALUATION

1.     List FIVE data transmission equipments

2.     Write short notes on the FOUR modes of data transmission

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     …………….. refers to the communication between computers

(a)   Data Communication      (b) Channel           (c) Simplex

2.     ……………. is the medium through which data is communicated or conveyed

(a)   Data Communication      (b) Channel           (c) Duplex

3.     …………….. is a device which enables a number of signals to be communicated on a single channel (a) Multiplexor (b) Modem (c) Router

4.     …………….. is referred to as a start – stop transmission

(a)   asynchronous transmission(b) synchronous transmission(c) simplex transmission

5.     The hardware that modulates and demodulates network signal is called …………….

(a)   Modem (b) Router      (c) Repeater

 

SECTION B

1. What is Data Communication?

2.Write short notes on the FOUR modes of data transmission


 

WEEK SEVEN

TOPIC - COMPUTER ETHICS

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

RESPONSIBLE USE OF COMPUTER

In order to have an ideal computer environment, there are rules and guidelines to follow: this serve as the standard or the responsible ways of using the computer system. These include:

1.     Put on the computer system when you need to and shut down properly when the system is not in use.

2.     A well illuminated room should be an ideal place to keep the computer system. The room must be well curtained to prevent sunlight ray. The room should be well ventilated and airy to dispatch the heat generated by the computer.

3.     Air conditioner for the effective cooling of the computer is ideal.

4.     Computer connection should be such that will protect the computer from damage. Avoid running computer cables on the floor.

5.     The use of pipe for cable system is a perfect way to run cables in the computer room.

6.     A dust free environment is an ideal place to keep computer and it must be maintained.

7.     A central switch system with an uninterruptible power supply will protect the computer from the power problem.

8.     Do not move the computer system while it is switched on to prevent an interrupt and also system from damage.

9.     Furniture and the computer system should be arranged in such a way that students can use the keyboard, mouse and other peripherals without any difficulty.

10.  Avoid liquid dropping into the computer system. Therefore, eating or drinking should be discouraged in the computer room.

11.  Handle all the equipment with care.

12.  Computer system should be serviced regularly and covered after use.

 

EVALUATION

Write TEN responsible ways of using of the computer system

 

RESPONSIBLE WAYS OF USING THE INTERNET

The internet or simply the net is an acronym for international network. It is a global interconnect network of computer for the purpose of sharing hardware, software and information resources. The internet can be responsible used in the following ways:

1.     Respect either people’s privacy

2.     Avoid getting password or authorized into other people’s information fraudulently

3.     Check your e-mail regularly and give prompt and polite response to mails

4.     Respect the copyright law by not copying or duplicate protected works or software without due permission.

5.     There should be no discrimination (e.g. sex, race) and therefore respect the opinion of other participants in the net group.

 

GENERAL EVALUATION

1.     Write FIVE responsible ways of using the internet

2.     Write TEN responsible ways of using of the computer system

 

 

WEEKEND ASSIGNMENT

1.     Write FIVE responsible ways of using of the computer system

2.     Write FIVE responsible ways of using the internet

 

 

WEEK EIGHT

TOPIC - WAYS OF MISUSING THE COMPUTER SYSTEM

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

1.     HACKING: This is the theft of hardware and software resources. It can also include the theft of physical cash as well as official documents.

2.     PORNOGRAPHY: This is the use of internet top show nude pictures, thereby abusing the mind of the teenage.

3.     CYBERWAR: This is the use of electronic network and information on the net to fervent trouble e.g. the use of internet to send provocative word.

4.     FRAUD: This involves using internet to defraud others. The fraudsters commonly refer to as yahoo boys defraud their victim of their money and valuables.

5.     PRIVACY OF SOFTWARE: When people go to the internet to copy software and use it without permission or authorization is referred to as the piracy.

6.     PLAGIARISM: This is the claiming the ownership of the researched work of software belonging to another person and get credit or reward for it. This is possible when existing job is pirated and represent as new and original.

7.     STEALING: This is the use of computer to steal money (i.e. unauthorized use or access to other people ATM). It is similar to fraud.

8.     VIRUS ATTACK OR THREAT: Virus is a program written by the programmer to adversely affect the smooth running of the computer system. Some internet users intentionally send virus to other internet users. The effects of virus attack are numerous.

 

GENERAL EVALUATION

Write FIVE irresponsible ways of using the computer.

 

WEEKEND ASSIGNMENT

1.     The theft of hardware and software resources is called ………………

(a)   Hacking          (b) Fraud               (c) Stealing

2.     …………  involves using internet to defraud others

(a)   Hacking          (b) Fraud               (c) Stealing

3.     …………. is a program written by the programmer to adversely affect the smooth running of the computer system. (a) Virus (b) Software (c) Anti – Virus

4.     The use of computer to steal money is called …….. (a) Hacking (b) Stealing (c) Virus

5.     ………….. is the use of electronic network and information on the net to fervent trouble

(a)   Cyber war       (b) Stealing           (c) Fraud

 

SECTION B

Write FIVE irresponsible ways of using the computer.


 

WEEK NINE

TOPIC - SAFETY MEASURES 1

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

The computer professionals and users should be aware of safety precautions to be taken when using the computer. To avoid health problems and accidents in the computer room the following safety measure should be considered.

1.     GOOD VENTILATION

Air conditioner is necessary in the computer room to make the computer perform well. The computer generates a lot of heat, hence the need for the air conditioner or fan. It is also necessary for the computer user to be comfortable. The design of a workstation should be such that people are maintaining neutral posture.

2.     SETTING COMPUTERS

When setting a computer room the following must be taken into consideration:

-          The computer must be space apart

-          There must be free entry and exit

-          All wire connecting the system should be properly disposed

-          A Computer library should be close to the computer room

3.     DUST FREE ENVIRONMENT

Dust should be prevented as often as possible in the computer room. The floor must always be kept clean the computer and its peripheral should be covered using the dust cover after use.

4.     PROTECTION FROM POWER PROBLEM

The surge protectors, the use of stabilizer and UPS must be upheld to prevent any form of damage caused by power fluctuations.

5.     GOOD LIGHTENING

The computer room should be well illuminated, use of florescent tubes and bulbs to provide light to make the room bright for all the activities carried out by the computer users is essential.

6.     COMPUTER SECURITY

This involves putting in place a reliable security measures to protect both the physical and logical assets of the firm.

7.     PHYSICAL SECURITY

These refer to the measures put in place to secure the computer hardware. UPS, Monitor, Keyboard, Tapes etc the following are the physical measures to prevent crime:

(a)   Provision of secured guards to control access to the center

(b)   Provision of log register to monitor staff

(c)   Provision of UPS and generator to prevent accidental loss of data

(d)   Ensuring that waste document are properly burnt

(e)   Ensuring that equipments are switched off when not in use

(f)    Solid construction of the computer center with secured windows

 

GENERAL EVALUATION

1.     Write down FIVE safety measures.

2.     Mention 2 physical security measures.

 

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1.     A Computer library should be close to the computer room.

(a)   True          (b) False      (c) I don’t know

2.     Provision of UPS and generator to prevent accidental loss of data.

(a)   True          (b) False      (c) I don’t know

3.     The computer room should be well illuminated. (a) True (b) False (c) I don’t know

4.     A Computer library should be close to the computer room

(a)   True          (b) False      (c) I don’t know

5.     Dust should be prevented as often as possible in the computer room.

(a)   True          (b) False      (c) I don’t know

 

SECTION B

Write down FIVE safety measures.

 

 

WEEK TEN

TOPIC - SAFETY MEASURES 1

Reference Book – A handbook on Computer Studies (PRACTICAL GUIDE) for Schools and Colleges by NiyiAdekolegan

 

CONTENT

PRECAUTIONS IN THE COMPUTER ROOM

The following rule and regulations must be observed when in the computer room

1.     There should be no eating.

2.     Do not rest your arm on the computer system.

3.     There should be no noise or fighting in the computer room.

4.     Handle the equipments with care.

5.     All computers should be cover after use.

6.     Do not receive visitors in the computer room.

7.     There should be strong security around the computer room to prevent theft.

8.     The system should be shut down or turned off after use.

 

EVALUATION

What are the rules and regulations that must be observed in the computer room?

 

LOGICAL SECURITY

This means building software check/control into the system to disallow unauthorized access. These are achieved through the use of passwords and access codes. The following logical measures will assist to prevent crime:

(a)   Provision of password for authorized users.

(b)   Provision of data encryption method.

(c)   Provision of a system to monitor the activities of all login users.

(d)   Provision of regular audit to all computing resources

(e)   Provision of security software to restrict the permission of the users to read only i.e. he cannot modify the data or copy the information.

(f)    Provision of an alarm system when an attempt is made to break into the program.

(g)   Provision or protection software to limit the users’ activities to specified directory or program.

 

GENERAL EVALUATION

(1) Write FIVE ways of preventing crime on the computer system.

(2) What are the rules and regulations that must be observed in the computer room?

WEEKEND ASSIGNMENT

SECTION A

Instruction: Choose the correct option from the ones lettered  A to D

1. A Computer room should be treated with care

(b)   True          (b) False      (c) I don’t know

2. There should be provision of security software.

(b)   True          (b) False      (c) I don’t know

3. The computer room should be provided with an alarm system.

(a)   True          (b) False      (c) I don’t know

4. A Computer should have a strong security

(b)   True          (b) False      (c) I don’t know


5. Logical security include provision of password for authorized users

(b)   True          (b) False      (c) I don’t know

 

SECTION B

1.     Write FIVE precautions that must be taken when in the computer room

2.     Write FIVE logical measures that will assist to prevent crime in the computer system.