COMPUTER STUDIES SCHEME OF WORK FOR SS3
Computer studies as a school taught subject goes beyond learning how to use the computer and programming. Computer studies is the study of ways of representing objects and processes. It involves identifying, analysing, and designing solutions to problems faced by individuals and the entire society. The importance of this subject can not be over emphasized. Below is the scheme of work containing the concepts which learners at the senior secondary three level are expected to learn from the subject. This should also help parents to guide their wards to learn as they stay home for the pandemic.
COMPUTER STUDIES SCHEME OF WORK FOR SS3 FIRST TERM
This scheme of work contains week, topic, subtopics, and activities which will guide the teachers in lesson planning and development.
-Definition of networking
-Types of networking
-Benefits of networking
Activities: Teacher leads students to define and list types of networking e.g. Ethernet, Token ring, Arcnet.
-Displays each network topology in class
-Drawing of flow diagram for each network topology in the class
-List network devices e.g. (Hubs, Modems, Switches, Router)
-State benefits of networking e.g. Sharing resources, easy
2. INTRODUCTION FOR WORLD WIDE WEB
-Definitions and full meaning of www
-Brief history of www
-Introduction to www
-Basic terminologies protocols
Activities: Teacher leads students to define and gives full meaning of www.
-Brief history of www in the class
-Basic terminologies: www, website, webpage, home page.
-Lists the protocols with full meaning, e.g. HTTP, html
-Hypertext transfer protocols
-Hypertext markup language
3. USES/BENEFIT OF WWW
-Navigating through websites
-Software for web development, cables and connectors
-Network cables and connectors
Activities: Teacher leads students to display and demonstrate a website on the internet (H.O.E)
-Navigate through websites e.g. finegoving.org
-Displaying network cables and connectors in the class, e.g. twisted pair, fiber option, telephone
-Displays data cables
-Power cables, data cables: Printer, USB, monitor etc.
-List types of connectors: e.g. male, female.
4. DATA BASE
-Examples of DBMS
-Forms of data base organization
Activities: Teacher leads students to define database and D.B packages
-Mention examples of database packages: e.g. DbaseIII, DbaseIV, Foxbase.
-Basic technologies: e.g. file, record, field, keys.
-List different forms of data base organization
-Displays an existing data base (file) in the system and features e.g. file designed as tables
-Tables composed of rows and columns (field) contains specific types of information.
Activities: Teacher guides students to create a database in the system (H.O.E)
-Define the structure
-Indicate field type
-Enter and save data
iv) Generating report
6. GRAPHICS(INTRODUCTION TO COREL DRAW)
-Definition of graphics, examples of graphics
-Features in CorelDraw e.g. environment: tools, color pallets.
Activities: Teacher leads students to define graphics
-Examples of graphics packages:
i) Paint ii) Harvard graphics iii) Photoshop iv) Corel draw, etc
-Features: Tools, and color pallets
-Opening Corel; draw from programs(H.O.E)
7. GRAPHICS(COREL DRAW)
-Basic programming III (one-dimensional array)
-Application to make simple design e.g.
i) Complimentary card, Business card
ii) Birthday and congratulatory cards
iii) School logo, Nigeria flag.
Activities: Teacher guides students to close and exit Corel draw
-Define one dimensional array (i.e. using DIM statement)
-Operations on array: input of an array, output of an array, arithmetic array.
8. BASIC PROGRAMING III
-Review of the for next statement, while end statement
-Write BASIC program
Activities: Teacher guides students to write simple program segments on each operation and program using FOR- NEXT and WHILE-END statement.
-State data in vector of 10 integer with and without a FOR-NEXT statement
-Calculate the average of one dimensional array with 100 numeric value.
9. BASIC PROGRAMMING III
-Calculate the area of 10 differentnrectangles with and without while-end statements.
– High Level Language (HLL)
Definition of HLL
Examples:- BASIC, FORTRAN, ALGOL etc.
Activities: Teacher guides students to calculate area of 10 different rectangles with and without the WHILE-END statement
-Output the sum of the first 100 integers
-Output the value elements of a given array
-Define high level language(HLLs)
-BASIC, FORTRAN, ALGOL, C, PASCAL, P/I, PROLOG, COBOL, as
-BASIC, FORTRAN, ALGOL(scientific)
1O. HIGH LEVEL LANGUAGE
-Classification of (HLLs)
-Features of BASIC, C, PASCAL, COBOL.
-Advantages of HLL over ML, LLL
Activities: Teacher leads students to classify
HLLs based on suitable application of C, PASCAL, P/I (General Purpose),
LISP, PROLOG(Artificial Intelligent AI), SNOBOL(Special Purpose
Programming Language), COBOL(Business)
-Interpreted Language: BASIC
-Compiled Language: PASCAL, COBOL, FORTRAN
-State the advantages of HLLs over ML, LLL
-State features of HLLs, BASIC, C,L PASCAL, COBOL, etc
11. OVERVIEW OF NUMBER BASES
-Review of number bases: decimal, hexadecimal.
-Conversion in number bases
-List digits in each number bases:
i) Binary-2, Octal-8, Decimal-10, Hexadecimal-12
ii) Leads students to carry out conversion of a given number to
another number base. E.g. 810 to binary number
12. OVERVIEW OF NUMBER BASES
-Basic arithmetic in number bases
-Addition and subtraction
-Carry out simple arithmetic operation using each number bases.
i) Addition operation e.g. 1102 +1112 , 0045 +2345
ii) Subtraction operation e.g. 1224 -0324 , 11102 -01012 etc.
COMPUTER STUDIES SS 3 SECOND TERM
1. DATA REPRESENTATION
-Definition of data representation.
-Description of data representation.
–Activities: Teacher leads students to define and list methods of data representation.
-Description of data representations method: Bits, BCD, EBCDIC, -ASCII
-Display character sets. ASCII:
American Standard Code for Information Interchange.
2. SECURITY AND ETHICS
-sources of security breaches
-virus, worm and Trojan horse.
-Poorly implemented or lack of ICT Policy.
Activities: Teacher leads students to list out the sources of security branches. E.g Virus, worms and Trojan horse.
– Poorly implemented or lack of ICT Policy
-poorly implemented network
-careless giving out of personal and vital information on the net without careful screening.
3. SECURITY AND ETHICS
– Preventive measures
– Legal issues
– Web content
– Crime, etc
Activities: Leads students to list preventive and discuss preventive measures against security breaches:
-use of anti-virus software
-use of fire fox
-exercising care in giving out personal and vital information
-encryption, proper network, implementation and policy, using sites with web certificates, exercising care in opening e-mail attachments.
4. SECURITY AND ETHICS
-Ownership right to: text, image, audio, video
-Web content. Subject to existing laws
Hacking of host country
-piracy: software, audio, video
-Cyber crimes: identify theft, internet fraud.
-Hacking: gaining authorized access to resources with the intention to cause harm.
5. Revision Revision
6. Examination Examination